197301
197301 197301
User Manual: 197301
Open the PDF directly: View PDF .
Page Count: 52
Download | |
Open PDF In Browser | View PDF |
.SCIENCE & TECFThiQL¢GY January, 1973 CD puters and automation and people "PHROPASE" ~. - Donald Michie - Marshall J. Farr The Path to Championship Chess by Computer Computer-Assisted Instruction Activities in Naval Research Databanks in a Free Society The Social Responsibility of Computer Specialists President Richard M. Nixon, the Bay of Pigs, and the Watergate Incident . 5106049 01 0 P 7401 TECHN CAL SERV CES r J5 5P ' ml 180 W SAN CA R.lOS ST SA JOSE CA - Alan F. Westin - Harvey S. Gellman - Richard E. Sprague 201721 018 95 113 Vo l. 22, No. 1 IF YOU COULD PREVENT JUST ONE IMPORTANT MISTAKE BEFORE IT HAPPENED - - like the Democratic Party's mistake with Senator Eagleton - like the Republican Party's mistake with the Watergate Bugging like the West German government's mistake in not catching the Arab guerrillas before they penetrated to the Israeli Olympic Team's building like Southern Airways' mistake in allowing three hijackers with guns on to one of their planes HOW MUCH WOULD THAT BE WORTH TO YOU - $100? - $1000? more? Our considered estimate is that 10 to 20% or more of the cost of operation of most businesses is the cost of mistakes. (Just one foreseeable mistake that "Computers and Automation" made in 1970 has cost us $4000.) WOULDN'T YOU AGREE THAT SENSE, COMMON AND UNCOMMON, OUGHT TO BE THE KEY TO PREVENTING MISTAKES? I \ f In a number of the issues of liThe Notebook on Common Sense, Elementary and Advanced", we examine systematically the prevention of mistakes, such as: No. 15: Preventing Mistakes from Failure to Understand ) No. 23: Preventing Mistakes from Forgetting - Volume 1, first subscription year No. 38: The Concepts of Feedback and Feedback Control ) No. 41: Preventing Mistakes from Unforeseen Hazards - Volume 2, second su bscription year Among the forthcoming issues of the Notebook in Volume 2 are: - Preventing Mistakes from Camouflage - Preventing Mistakes from Placidity and we are planning at least 20 more issues in Volumes 2 to 4 under this general heading. WHY NOT TRY THE NOTEBOOK ON COMMON SENSE? GUARANTEE: (1) You may return (in 7 days) the first batch of issues we send you, REFUND, if not satisfactory. (2) may cancel at any time, and you a refund for the unmailed portion scription. PAST ISSUES: As a new subscriber, you do not miss past for FULL Thereafter, you will receive of your sub- issues. Every subscriber's subscription starts at Vol. 1, No.1, and he eventually receives all issues. The past issues are sent to him usually four at a time, every week or two, until he has caught up, and thus he does not miss in')Portant and interesting issues that never go out of date. HOW CAN YOU LOSE? - - - - - - - - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - - - - - - - - - - To: COMPUTERS AND AUTOMATION AND PEOPLE 815 Washington St., R12, Newtonville, Mass. 02160 ( ( ) YES, please enter my subscription to the Notebook on Common Sense at $12 a year, 24 issues (newsletter style), and extras. ) Please send me (as FREE premiums for subscribing) the first six issues: 1. Right Answers - A Short Guide to Obtaining Them 2. The Empty Column 3. The Golden Trumpets of Yap Yap ( ) I enclose $ ( ) Please bill me 4. Strategy in Chess 5. The Barrels and the Elephant 6. The Argument of the Beard ( ) Please bill my organization NAME _______________________________________________ TITLE _________________________________ ORGANIZATION ______________________~-----------------------------------------------------ADDRESS ___________________________________________________________________________________ SIGNATURE ___________________________________________ Purchase Order No. _______________________ 2 I COMPUTERS and AUTOMATION for January. 1973 I INVENTORY OF THE 36 ISSUES OF - TITLES AND SUMMARIES THE NOTEBOOK ON COMMON SENSE, FIRST YEAR VOLUME 1 1. Right Answers - A Short Guide to Obtaining Them A collection of 82 principles and maxims. Example: "The moment you have worked out an answer, start checking it - it probablY isn't right." 2. The Empty Column A parable about a symbol for zero, and the failure to recognize the value of a good idea. 3. The Golden Trumpets of Yap Yap 4. Strategy in Chess 5. The Barrels and the Elephant A discussion of truth vs. believability. 6. The Argument of the Beard The accumulation of many small differences may make a huge difference. 7. The Elephant and the Grassy Hillside The concepts of the ordinary everyday world vs. the pointer readings of exact science. 8. Ground Rules for Arguments 9. False Premises, Valid Reasoning, and True Conclusions The fallacy of asserting that the premises must first be correct in order that correct conclusions be derived. 10. The Investigation of Common Sense 11. Principles of General Science and Proverbs 8 principles and 42 proverbs. 12. Common Sense - Questions for Consideration 13. Falling 1800 Feet Down a Mountain The story of a skimobiler who fell 1/3 of a mile down Mt. Washington, N.H., and was rescued the next day; and how he used his common sense and survived. 14. The Cult of the Expert 15. Preventing Mistakes from Failure to Understand Even though you do not understand the cause of some trouble, you may still be able to deal with it. The famous example of a cure for malaria. 16. The Stage of Maturity and Judgement 17. Doomsday in St. Pierre, Martiniq'ue - Common Sense vs. Catastrophe How 30,000 people refusing to apply their common sense died from a volcanic eruption. 18. The History of the Doasyoulikes 19. Individuality inHuman Beings Their chemical natures are as widely varied as their external features. 20. How to be Silly 71 recipes for being silly. Example: "Use twenty words to say something when two will do." 21. The Three Earthworms A parable about curiosity; and the importance of making observations for oneself. 22. The Cochrans vs. Catastrophe The history of Samuel Cochran, Jr., who ate some vichyssoise soup. 23. Preventing Mistakes from Forgetting 24. What is Common Sense? An Operational Definition A proposed definition of common sense not using synonyms but using behavior that is observable. 25. The Subject of What is Generally True and Important Common Sense, Elementary and Advanced 26. Natural History, Patterns, and Common Sense Some important techniques for observing. 27. Rationalizing and Common Sense 28. Opposition to New Ideas Some of the common but foolish reasons for opposing new ideas. 29. A Classification and Review of the Issues of Vol. 30. Index to Volume 1 COMPUTERS and AUTOMATION for January, 1973 VOLUME 2 31. Adding Years to Your Life Through Common Sense 32. The Number of Answers to a Problem 33. "Stupidity has a Knack of Getting Its Way" 34 and 35. Time, Sense, and Wisdom 36. Wisdom - An Operational Definition .... 24 issues promised, 36 issues delivered, for good measure Some Comments from Subscribers believe these to be the best, if not the most important, readi ng that I have had th is year. - Harold J. Coate, EDP Manager, St. Joseph, Mo. Your concept is brilliant, and a welcome antidote to much which is passed off as useful knowledge these days. Keep up the good work. - Charles E. Abbe, Data Systems Analyst, Pasadena, Calif. Very good articles; something all managers should read. - William Taylor, Vice President, Calgary, Alberta As I am involved with systems work, I can always use one of the issues to prove a point or teach a lesson. - Edward K. Nellis, Director of Systems Development, Pittsford, N.Y. Thoroughly enjoy each issue. - David Lichard, Data Processing Manager, Chicago, III. All are good and thought-provoking - which in itself is worthwhile. Keep it up. - Richard Marsh, Washington, D.C. Especially like "Right Answers". - Ralph E. Taylor, Manager of Research and Development, West Chester, Ohio Your tendency to deal with practical applications is very rewarding. - Jeffrey L. Rosen, Programmer, Toronto, Canada PAST ISSUES: As a new subscriber, you do not miss past issues. Every subscriber's subscription starts at Vol. 1, no. 1, and he eventually receives all issues. The past issues are sent to him usually four at a time, every week or two, until he has caught up, and thus he does not miss important and interesting issues that never go out of date. GUARANTEE: (1) You may return (in 7 days) the first batch of issues we send you, for FULL REFUND, if not satisfactory. (2) Thereafter, you may cancel at any time, and you will receive a refund for the unmailed portion of your subscription. ~ WE WANT ONLY HAPPY AND SATISFIED SUBSCRIBERS. - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - - To: Computers and Automation and People 815 Washington St., R1, Newtonville, Mass. 02160 ) YES, I would like to try the "Notebook on Common Sense, Elementary and Advanced". Please enter my subscription at $12 a year, 24 issues, newsletter style, and extras. Please send me issues 1 to 6 as FREE PREMIUMS for subscribing. I enclose ) Please bill me. ) Please bill my organization. Name _ _ _ _ _ _ _ __ Title _ _ _ _ _ _ _ _ __ Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ Signature _ _ _ _ _ _ _ _ _ Purch. Order No. _ _ __ 3 Vol. 22, No.1 January, 1973 computers and 'automation and people Editor Edmund C. Berkeley Assistant Editors Barbara L. Chaffee Linda Ladd Lovett Neil D. Macdonald Software Editor Stewart B. Nelson Advertising Director Edmund C. Berkeley Art Director Ray W. Hass Contributing Editors John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ned Chapin Leslie Mezei Ted Schoeters Richard E. Sprague Advisory Committee James J. Cryan Bernard Qu int Editorial Offices Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617 -332-5453 Advertising Contact The Publisher Berkeley Enterprises, Inc. 815 Washington St. Newtonville, Mass. 02160 617 -332-5453 "Computers and Automation" is published monthly, 12 issues per year, at 815 Washington St., Newtonville, Mass. 02160, by Berkeley Enterprises, I nco Printed in U.S.A. Second Class Postage paid at Boston, Mass., and additional mailing points. Subscription rates: United States, $9.50 for one year, $18.00 for two years. Canada: add 50 cents a year for postage; foreign, add $3.50 a year for postage. NOTE: The above rates do not include our publication "The Computer Directory and Buyers' Guide". If you elect to receive "The Computer Directory and Buyers' Guide", please add $9.00 per year to your subscription rate. Please address all mail to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160. Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St .. Newtonville, Mass. 02160. © Copyright 1973, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint), and allow three weeks for the change to be made. 4 Computers and the Intellectual Frontier [T A] 7 The Path to Championship Chess by Computer by Professor Donald Michie, Director, Department of Machine Intelligence, Edinburgh University, Scotland How a computer can probably be programmed to exceed the talent of the best human chess players ...... and "if we can find out how to program world championship chess, then we can program anything." Computers and Education [T A] 10 Computer-Assisted Instruction Activities in Naval Research by Dr. Marshall J. Farr, Office of Naval Research, Arlington, Va. A report on some of the areas of computer-assisted instruction in which the Office of Naval Research has a strong interest in research and development. Computers and Society [NT A] Project on Computer Databanks by Professor Alan F. Westin, Columbia University, New York, N.Y., and many associates A summary of a nationwide factual study (under the auspices of the National Academy of Sciences) of: what the use of computers is actually doing to recordkeeping in the United States; and what the growth of large-scale databanks, both manual and computerized, implies for citizens' rights to privacy and the due process of law. 18 Databanks in a Free Society: A Summary of the 14 The Social Responsibility of Computer Specialists [NT A] by Dr. Harvey S. Gellman, Toronto, Canada How computer systems (and other technology) often produce unexpected, troublesome, and even harmful side-effects - wh ich are made worse by the nonprofessional attitudes of many computer specialists. 6 From "Computers and Automation" to "Computers and People;' by Edmund C. Berkeley, Editor, Computers and [NT E] Automation and People How and why the time has come when a change in the name of Computers and Automation should be considered, and be put into effect, gradually. COMPU~ERSand ,AUTOMATION for January, 1973 The magazine of the design, applications, and implications of information processing systems - and the pursuit of truth in input, output, and processing, for the benefit of people. Computer People and Aptitude Tests 31 Eight Photographs of a Bush: AnswersPictorial Reasoning Tests - Part 8 by Neil Macdonald, Assistant Editor How close observation and common-sense reasoning can lead to the answers to the pictorial reasoning test published in the October 1972 issue. [NT F] Front Cover Picture The Profession of Information Engineer and the Pursuit of Truth 33 President Richard M. Nixon, the Bay of Pigs, and [NT A] the Watergate Incident by Richard E. Sprague, Hartsdale, N.Y. How President Nixon lied in 1960 about the plans for the Bay of Pigs Invasion, and is suppressing in 1972 the investigations of the Watergate Incident. The front cover drawing, called "Phropase", was produced by an Algol 60 program, drawing straight lines ax + by + c = 0, where a, band c were "stepped arithmetically in nested loops". The computer used was an ICL 1904A, driving a Calcamp 1934/6 plotter. The programmer-artist is Nihan Lloyd-Thurston, Kings Mill Lane, South Nutfield, Surrey, England. 37 The Frenchman Who Was To Kill Kennedy [NT A] by Phillippe Bernert and Camille Gilles, L 'Aurore, Paris, France; translated by Ann K. Bradley, Computers and Automation and People Engl ish translation of the f=rench newspaper report on Jose Luis Romero, which was reprinted in French in the December issue of Computers and Automation [NT A] 40 Why I Distrust the Romero Story by Robert P. Smith, Director of Research, Committee to Investigate Assassinations, Washington, D.C. The Romero report reprinted from L 'Aurore has many earmar.ks indicating that it is very difficult to believe. 13 Unsettling, Disturbing, Critical [NT F] Statement of pol icy by Computers and Automation and People Reference Information 23 Annual Index for Volume 21 (1972) of [T R] Computers and Automation An index by author, title, and subjects, to the thirteen 1972 issues of Computers and Automation NOTICE *0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTE R DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY. Departments 41 50 46 47 44 45 Across the Editor's Desk Computing and Data Processing Newsletter Advertising Index Calendar of Coming Events Monthly Computer Census New Contracts New Installations Computers and Puzzles 32 Numbles by Neil Macdonald [T C] 36 Problem Corner by Walter Penney, CDP [T C] COMPUTERS and AUTOMATION for January, 1973 Key [A] [C] [E] [F] [G] [NT] [T) - Article Monthly Column Editorial Forum The Golden Trumpet Not Technical Technical 5 EDITORIAL From nComputers and Automation" . to nComputers and People" 1. Names When this magazine was first published in 1951, it was called "The Computing Machinery Field". That was a time when many people were still searching for a short name for "computers". The word "computer" at that time always implied a human being computing, and not a machine. The same view influenced the choice of name of the "Association for Computing Machinery." In 1953 this magazine changed its name to "Computers and Automation," and has retained that name for twenty years. These years have seen great changes in "the computing machinery field", which has become "the computer field". A great deal of automation also has occurred, but computers and not automation have occupied the limelight of public attention. The three-syllable term "computers", it seems to me, is still preferable to any of: - data processing, five syllables, plebeian, more and more out of date because much more is processed than just data; - information processing, seven syllables, more accurate, but also incomplete because it leaves out "idea processing", "artificial intelligence", and other really important extensions of computer programming; - "electronic data processing", nine sy IIables (clumsy), having all the disadvantages of "data processing" plus the disadvantage of "electronic" which implies omission of "optical", "magnetic", etc.; - "automatic data processing''; nine syllables (also clumsy), having all the disadvantages of "data processing" plus the disadvantage of "automatic" which leaves out the essential contributions of human guidance, human adapting to applications, etc. It is interesting that the persons who tried so hard to nam{. the field using an attitude of "keep your feet on the ground" are the persons left behind - largely by the development of computer programs that express an ever greater degree of reasoning, calculating, and sophistication. 2. Substance A great many of the important technical computer problems of the last 20 years have been largely solved; a great many of the important social computer problems are very much unsolved. For several years it has been evident that the most important field of unsolved problems related to computers is the field of the relations of computers to people. To name just a few of these problems: - privacy and computers monopoly and computers crime and computers electronic warfare and computers - medicine and computers traffic control and computers antiballistic missile systems and computers urban problems and computers the side effects of computers upon society the prevention of doomsday and the application of computers thereto 3. Policy As we have said before, we believe that the profession of information engineer includes not only competence in handling information using computers and other means but also a wide responsibility towards people, a professional and engineering responsibility. This includes making sure of: - the reliability and social validity of the input data; - the correctness of the processing; and - the reliability and social validity of the output results. in the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he accepts and uses, and the safety and efficiency of the bridges he constructs on which human beings will cross chasms risking their lives. Accordingly, as our readers know, we often publish articles and other information related to socially useful input and output of information systems. We seek to publish what is unsettling, disturbing, critical - but productive of thought and a better and safer earth for all humanity to live in - the fragile spaceship in which our children and future generations may have a future instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war; nuclear weapons; pollution; the population explosion; the frightening economics of growth; widespread deception; and much more. In fact, an especially serious and troublesome problem is systematic misrepresentation, deception, and lying by vested interests - a problem we focus on. 4. Name Change In recognition of these facts and this policy, we have decided that the time has come when "Computers and Automation" will change its name to "Computers and People", in a gradual process using an intermediate name "Computers and Automation and People" - for short, "CAP" instead of "C&A". To change the name is reasonable and seems necessary and desirable; to change gradually seems much better than to change abruptly. E:~C.~ Edmund C. Berkeley Editor COMPUTERS and AUTOMATION for January, 1973 The Path to Championship Chess By Computer Professor Donald Michie, Director Dept. of Machine Intelligence Edinburgh University Edinburgh, Scotland "If we could program world championship chess, then we could program anything." Based on a,l article "Programmer's Gambit" in The New Scientist for August 17, 1972, an international weekly review of science and technology, 128 Long Acre, London we 2, England, and reprinted with permission. Has something gone wrong with computer chess? If so, what? In a recent New Scientist article (20 July 1972, vol. 55, p. 134) Peter Wason discussed the psychology of the game. He also referred to computer chess programs and, with an element of courteous understatement, observed "they are certainly below master strength." The first point to remark is that the task is far, far more difficult than some early optimists supposed -- so much so that quite radical advances in machine intelligence, not just in programming and hardware technology, are required if chess programs are ever to break through to master play. The "Grandmaster Barrier" The reasons for what may be called the "grandmaster barrier" are connected with powers of abstraction, generalisation and learning, all of which are still absent from tOday's chess programs. Chess at master level makes such searching demands on these abilities that it offers a life-time's dedication for outstanding intellects. Hence, although it has been one of the earliest task domains to be chosen for machine intelligence studies, chess remains one of the most illustrative and one of the most elusive. The distinguished applied mathematician, I. J. Good, himself an expert chess player, believes that when a chess program has been developed capable of defeating the world champion, we shall be no more than five years away from the appearance of the "ultra-intelligent machine", intellectually superior to man in all departments of thought. While supporting Good's evaluation, I would prefer to phrase it in other terms and to say that if we could program world championship chess then we could program anythingl COMPUTERS and AUTOMATION for January, 1973 It is possible to take up two exaggerated and opposite positions concerning contemporary chess programmes. Both are mistaken. Position 1: The attempt to match human intellectual skill across the chessboard has failed. The Current Strength of Computer Chess Hubert Dreyfus, the Rand Corporation mathematician, pronounced a few years ago that no computer could play even amateur chess. He was challenged to play against the Greenblatt chess program and was ignominiously defeated. This program is one of those which regularly take part in American tournaments, including tournaments restricted to computer programs. Two other programs of similar playing strength are those of Atkins and Slate and of Gillogly, currently rated around 1400 to 1500 on the US Chess Federation scale which is calculated on the basis of past tournament performance. Table 1 may be of help in calibrating this scale. Bobby Fischer's last USCF rating was 2824, the highest ever awarded. Position 2: Computer programs will attain grandmaster rating in the near future. Those who hold this position usually believe that it is simply a matter of developing and extending present-day principles of chess programming, aided by the continued rapid growth of hardware speeds and storage capacities of computers. This second position is wrong for more subtle reasons than the first, and cannot be dismissed so cursorily. Chess Knowledge Consider the following two apparently unrelated facts: 7 1. Not one of the three leading chess programs occupies more than 20,000 locations of computer memory (by this I mean "fixed" memory, not the working space occupied for transient periods by the intermediate products of calculation). Stanford Research Institute's program for planning a robot's movements occupies more than five times this number. 2. Although for the past century or more chess games at grandmastet level have usually ended in draws, Bobby Fischer recently won 19 consecutive games against grandmasters. The interpretation which some chess experts place on the second fact is that Fischer has discovered new areas of knowledge about chess, and in some sense has a deeper understanding of the game than his opponents. I have put emphasis upon "knowledge" and "understanding" because these words give a clue to the extraordinarily small machine memory space occupied by all the above-mentioned chess programs. When we look inside these programs we find virtually nothing there which corresponds to "knowledge" or "understanding". What we do find can best be described as a finely tuned mechanism for making the best possible job of playing chess without knowing anything about the game or understanding what one is doing. Table 1 THE PERFORMANCE OF THE BEST CONTEMPORARY CHESS PROGRAM Bobby Fi scher Machine Intelligence Chess i like any other highly developed intellectual sk 11 in that it can be subdivided into two categories 1. What the player knows, and 2. What he can do with this knowledge. These two subdivisions mirror very clearly two areas of machine intelligence research in which progress has and has not been made. Virtually all the progress before 1970 was concerned with category (2), i.e. with the mechanisation of processes of search and deduction whereby the direct implications of category (1) may be efficiently extracted. Category (1) itself, in the machine intelligence context, is concerned with finding principles whereby large bodies of knowledge may be represented in the machine in forms sui table: for indirect and analogical reasoning; for the formation of new generalisations; and for the automatic modification and extension of the "knowledge base" via learning processes. In the 1950s and 1960s little progress was made with category (1). Hence experimental programs, for chess as for everything else, necessarily took the form of "toy systems" in which all the program's ingenuity went to extracting the most out of a minimal repertoire of stored facts. We have seen that in the case of chess such facts might be (a) the rules of chess, (b) evaluation rules which can say of any two board positions "this one is probably stronger than that", and (c) stored "book" openings. 28 International grandmasters 26 to 28 International masters 23 to 26 American masters 21 to 23 Expert players 19 to 21 Strong amateurs 16 to 18 Best chess program Most amateurs 15 up to 14 The figures are the U.S. Chess Federation rating scale with 00 omitted. This scale is calculated on the basis of past tournament performance. Figure 1 Two chess positions conforming to a single relational description (see text). White has the move Look-Ahead This mechanism is essentially that of looking ahead along a tree of possibilities, evaluating the terminal nodes of the look-ahead tree according to some "evaluation function", and then "backing up" these values to the root of the tree by a process known as "minimaxing". The various branches at the root correspond to the immediately available moves; the backed-up values associated with these branches are used as the basis for selecting the next move. The only chess "knowledge" is that contained in the legal move generator (i.e. knowledge of the rules of chess), in the evaluation function itself, and in stored "book" openings (where these are employed). Such knowledge is a grain of sand beside the mountains amassed even by amateur players, and it is a tribute to what can be accomplished by the look-ahead process, and by sheer brute-force calculation, that these chess programs can hold their own at all. Of course, if their authors knew how to program some of the missing knowledge into the machine they would do so. 8 Chess Theorems Why should we not add to this bare cupboard the good things which make a chess master what he is, COMPUTERS and AUTOMATION for January, 1973 ,) starting with the vast mass of trite chess theorems, such as: and sequences of schemas ("themes", "main variations"), resorting to detailed look-ahead, for which the human brain is ill-equipped, only when he has to. "Bishops cannot attack squares of opposite colour." "A piece blocking an enemy isolated pawn is safe from pawn attack." "King and Rook against King is a won game." and going on to deeper theorems and postulates which separate the expert's knowledge from the club player's, the master's from the expert's, and the grandmaster's from the master's? After all, a great deal even of this last and highest body of knowledge is explicitly recorded in the published chess literature. Why not just put it all into the machine? The short answer is that the problem of how to represent knowledge (whether of chess or of any other complex and ill-structured domain) in machineoriented form is the focal question for machine intelligence research in the 1970s; although intensive studies are now under way, and preliminary gains have been reported, we must expect to wait awhile before the front decisively cracks. Computer Language for Salient Features The heart of the problem is concerned with description -- with the development of computer languages and notations with powerful facilities for describing the salient and significant features of any situation. Let us try an impressionistic sketch, using both chess and non-chess examples, of some of the issues involved. Relational Descriptions A compact notation for descriptions of the kind shown is given by the use of "relational structures" illustrated graphically in Figure 2. Note that such a description typically covers many positions, and a second position is shown, Figure 1 (b), which also conforms to the scheme of Figure 2. In the case chosen for illustration they do indeed have much in commonj in both cases white can mate taking advantage of two pins. Moreover, this notation extends in a natural and easy way to all the usual basic concepts -- "forks", "blocks", "discovered checks" and so forth. OR OB~OR \~ 08 Figure 2 A relational description of the chess positions of Figure 1 drawn as a labelled directed graph (White in italics; black in bold type) \ KR \ u'~::~K K -KKtP .KR' \ 'KKtP Key: _ Defends ===> Attacks _ _ Pins -- - ~ Can check Not only do descriptive schemes of this kind correspond intuitively to the way in which chess positions are grouped for purposes of recall or for the specification of sub-goals. They are ·beginning to playa prominent part in mechanisation techniques in areas of machine intelligence superficially unrelated to chess. Figure 1 (a) shows a chess position, and we wish to describe it. The exhaustive specification of where every piece is has no use beyond the calculation of the tree of possibilities for look-ahead purposes. If we want to think in a broader style about the position we need a broader style of description. The use of a few relations between pieces with a more or less conventional notation might give us something like Table 2. (Pieces belonging to the side with the move -- white -- are shown in italics, black in bold) o Scene /l "'" O~O~O ,,\/ Qarick Table 2 PINS, ATTACKS, DEFENSES, POSSIBLE CHECKS pins OB pins KKtP defends QR can check K OR attacks QB KR attacks KKtP K defends KKtP K defends OS K defends KKtP OR defends KR KR defends OR OR can check K KR can check K KR QB QB QR We might or might not wish to add, for some purpose or other, information concerning certain key pieces, such as "WK on KRl". The important thing is that a schematic description of this kind defines a large class of positions the members of which are hopefully (if the descriptors have been well chosen) "essentially" similar to each other. The chess master reasons about schemas COMPUTERS and AUTOMATION for January, 1973 '\ I Key: Figure:5 Graphic notation analogous to that in Figure 2, applied to a visual object --+- ==> ~ Part of Supported by Kind of Figure 3 depicts relational descriptions, using essentially the same graphic notation, not of chess positions but of visual scenes. These structures are manipulated by a computer program written by Pat Winston and others at MIT. Its task is to construct descriptions of s~enes inspected through the television camera. The figure shows a number of objects all conforming to the description for ARCH. The program can be "taught" to improve its descriptions by being shown examples and counter-examples. The entire program occupies many times more computer memory (again, we are speaking of program space, not workspace) than the chess programs. Winston's task is an intrinsically easier one than theirs, but his program approaches it in a much deeper fashion. What are the prospects of introducing a similar degree of depth into the approach to computer chess, and what are the likely consequences of doing so? (please turn to page 36) 9 Computer-Assisted I nstruction Activities in Naval Research Dr. Marshall J. Farr Office of Naval Research 800 No. Quincy St. Arlington, Va. 22217 'The computer is infinitely patient, and its programs can represent the teaching approaches and knowledge of the best minds in pedagogy." Computer-Assisted Instruction (CAl) refers to the use of the computer for instruction, i.e., as a means of presenting material to, and interacting with, astudent. Navy activity in this domain is directed toward utilization of the computer to provide adaptive, individualized instruction of the highest quality. Because computer technology and its programming arts are already so advanced, and are continuing to progress so rapidly, on-line interactive, man-computer communication need not be stilted and impersonal. Advantages and Limitations Research in CAl indicates that some students relate better to an interactive computer than to a human instructor. And, of course, a computer is not subject to human frailties. Modern time-sharing computers are highly reliable, work overtime without complaint, and never go on strike. Moreover, the computer is infinitely patient, and its programs can represent the teaching approaches and knowledge of the best minds in pedagogy as well as in diverse subject areas. Despite the many advantages of CAl it should be recognized that the computer's tutorial effectiveness is limited by what we still do not know about basic learning processes, about why we learn, how we learn, how we remember, and how we integrate bits of knowledge into a coherent whole. man-computer relationship in which either party can take the initiative, i.e., ask and answer questions and engage in discussion. The Bolt, Beranek and Newman approach with SCHOLAR generates the computer dialogue out of a data base that is a complex but well-defined structure in the form of a semantic network of facts, concepts and procedures. A semantic information structure or network is an organization of units of information in terms of their meaning and mutual relationships. In contrast, when a network is based on how words are organized sequentially or grammatically within a sentence, it is serving as a syntactic structure. SCHOLAR is different from the traditional approach to CAl, which may be considered to be frameoriented. In such a system, a frame (each single display presented to the trainee) is constructed out of specific pieces of text, specific questions with their predicted answers, errors and anticipated branching. All frames in this kind of system are entered in advance by the teacher or programmer. In such a system, the student is capable of little or no initiative, and must communicate with the computer in a relatively restricted form of language. And the teacher has the burden of preparing questions, answers, and branching strategies. Here, the system controls the student; but it is incapable of real initiative or decision power of its own. Information-Structure Oriented These kinds of questions have been the subjects of investigations sponsored by the Office of Naval Research and directed toward the advancement of CAl technology. These studies shed light on such aspects as individual differences in learning and means for identifying and taking advantage of an individual's unique aptitudes and abilities, while ~~~ n.Lt~~~a~ n.L:I'lh~ s ~esire,t~ _1 ~~~~: _, ~_? ~ ~t~~~, ~~;~~, \JM~ .........n.. . . . . . . . ~~ 0';" 1l1U\.dl l"VJl\.d:;J.I1CU v¥J.I.;U t;l\.pJ.V.LJ.JJ~ the learning process as with controlling it. Mixed-Initiative Dialogue Under ONR sponsorship, Dr. Jaime Carbonell of Bolt, Beranek and Newman is pursuing research with a system called "SCHOLAR," which is characterized by a mixed-initiative dialogue between learner and computer. The term mixed-initiative indicates a Reprinted with permission from Naval Research Reviews, vol. 25, no. 9, September, 1972, published by the Department of the Navy, Office of Naval Research, Arlington, Va. 22217 10 In contrast to a frame-oriented system, SCHOLAR's semantic network system represents what Carbonell calls an Information-Structure-Oriented (ISO) approach. The network allows SCHOLAR to generate the material to be presented to the student in reasonably natural conversational English. In its present implementation, the experimental program, which uses Dr. Marshall J. Farr is Director of the Personnel and Training Research Program in the Psychological Sciences Division of ONR. He also has served as Assistant Director of ONR's Engineering Psychology From 1960-1964, he was a Research PsyProgram. chologist at the U.S. Naval Training Device Center, then located at Port Washington, New York. Dr. Farr has taught in the Psychology Departments of Fairleigh Dickinson University and the New School (formerly the New School for Social Research) in New York City. COMPUTERS and AUTOMATION for January, 1973 South American geography as its subject, is aimed at reviewing the student's knowledge in this field. But it is being designed with a good degree of modularity in both program and data base, in order to assure ready generalization to many other examples and fields of application. A good description, with illustrations of the way SCHOLAR works, is contained in Carbonell's article in the October 1971 issue of Naval Research Reviews. Carbonell will shortly begin to evaluate the instructional merit of the full mixed-initiative capability as compared to a reduced, less interactive, version of SCHOLAR. Both versions will operate on the data base. Performance Training Dr. Joseph Rigney, who directs the Behavioral Technology Laboratories at the University of Southern California, has been working on a method for computer-assisted performance training, using a computer time-sharing system to help trainees to learn serial tasks, from operating equipment to electronic troubleshooting. TASKTEACH is the generic name of two large computer programs for this tutorial system. TASKTEACH provides the student with variable amounts of learning support, as he requests it, to help him organize the material and the processes which lead to mastery. During each learning session, TASKTEACH continuously updates the history of the student's progress and the state of the equipment or task structure that it is simulating. Thus it can generate responses to the student from this updated information. TASKTEACH logic is made specific to a particular equipment or task structure by relatively short lists which describe elements and relationships among them in sufficient detail for the simulation. These lists replace the conventional, frame-by-frame description of the typical CAl instructional sequence. Trou bleshooting To use TASKTEACH to learn to troubleshoot electronic devices from front-panel controls and indicators, the student selects a course, e.g., on the AN/SPA-66 radar repeater, and enters a problem number. This directs the program to simulate a failure in a particular circuit of the equipment. The computer then describes to the student, during its interaction with him, those front-panel indicator symptoms that the malfunction would produce. The student proceeds to collect symptoms from indicators by manipulating the front-panel controls in patterns that will (1) make particular kinds of information visible on each indicator when the equipment is functioning normally, and (2) uncover all possible symptoms of abnormal functioning. The student can do this symptom-collecting in any order he chooses. He is not constrained to a fixed procedural sequence. Furthermore, he can either ask for only one type of information at a time, or he can make a whole series of front-panel tesLS by entering a list of indicators and control settings in one input message. By using some of the commands in TASKTEACH that give him detailed knowledge of results, and that allow him to "look -ahead" and test hypotheses about the malfunction, the student 'can learn about the effectiveness of each test he makes, and can increase his knowledge of possible causes of symptoms. In this way, he can learn to improve his troubleshooting strategy. "Backwards Troubleshooting" The student can also ask the program to "insert" a known malfunction in the equipment. He can then COMPUTERS and AUTOMATION tor January. 1973 test his knowledge of the symptoms it would produce by attempting to predict the indicators and the types of information displayed by each, as they would be affected by this known malfunction. The program wi 11, in thi s "backwards troubleshooting" mode, evaluate the student's predictions and correct those that are wrong. Since equipment like the AN/SPA-66 radar repeater and the AN/URC-32 radio transceiver have from 20 to 40 front panel controls that have to be set in the right patterns before symptom information is visible on an indicator, the student must, of course, learn these patterns. The troubleshooting section of TASKTEACH not only corrects the student's incorrect patterns, but also includes a provision for drill in making these settings. The student can select the particular information he wants made known by some indicator. He then instructs the computer to set the controls in the correct pattern, and is given error-correcting knowledge of results by the program. The student can run through a series of these drills any time he chooses, in conjunction with a troubleshooting session. Goal-Action Hierarchies In addition to the troubleshooting program, TASKTEACH includes a program to help students learn other types of task structures. Radio operators, for example, could learn how to tune the transmitter in the AN/URC-32, or how to set it up in a particular one-of-five "receive modes." Similarly, a mechanic could learn how to disassemble, repair, and reassemble a mechanical device such as a carburetor. As indicated earlier, this program is made specific to a particular task by list-structures which describe goals, subgoals, actions, and constraints that specify the ways these elements are organized sequentially. Since almost all human work can be described in terms of goal-action hierarchies, this part of TASKTEACH is potentially widely applicable. The TASKTEACH programs were designed to be used with a variety of terminals, including on-line front-panel simulators analogous to those currently being used by IBM for their in-house computer maintenance training. However, these programs currently are used with teletypes or alphanumeric CRTs and random-access slide projectors under program control. The projectors are used to display color photographs of controls and indicators on the particular equipment that is the subject of the training. In summary of TASKTEACH, it represents a capability which provides a number of learner options, and which can be used in a number of different ways or modes. The student need not have control over the learning-support functions. They can be made automatic, left to the instructor to control, or, with a little additional programming, they can be made part of an adaptive scheme. In a similar way different kinds of troubleshooting strategies could be included as models for the student to learn. CAl Course in Computer Programming Professor Richard Atkinson. Chairman of the Psychology Department at Stanford University, has been in charge of administering a CAl course in computer programming at Di Anza College (a junior college near Stanford) and at UCLA. Students receive college credit for this course, which was originally developed with support from NASA Ames. For this ONR contract, Atkinson and his staff have been designing data-collection routines to measure student 11 performance at frequent intervals during the course. In addition, the program has been constructed so as to analyze a student-written program to see if it will run on the computer. If not, the instructional program assists the student in debugging his own material. The computer program for this course allows the learner to control what material is displayed to him, as well as his rate of learning. As the student goes through the course, his response history is recorded automatically in terms of how frequently he requests reviews, how long he devotes to various items and modules, how rapidly he responds, and so on. The Stanford group will analyze the dominant patterns of learner behavior, and correlate each individual's response-history with his course achievement. The findings will be examined to determine such things as the best time to branch, to repeat material, and to provide feedback to the student. In the next phase of this research, two additional CAl modes will be tried. Their structure will be based on the recommendations for optimal patterns of presentation, review, feedback, etc., toward which the research on the ongoing learner-controlled CAl wi 11 lead. Best Instruction Strategies? Why is the mode of learner-controlled instruction a model from which optimal instructional strategies can be derived? When the student performs at his own rate, he is not constrained by a program. In a sense, he automatically selects what is most motivating to him, what he feels he needs and wants to learn. Learning might really turn out to be funo Good students can tackle complex problems and can concentrate on conceptual rather than computational matters. But most of all, who knows better than the pupil himself what he is ready to learn next, and when he is ready? After all, learning takes place, in the final analysis, between the ears. . Now, returning to Atkinson's work: The first additional mode, a response-insensitive one, will be a straight-line, completely canned course. This means that what is presented to the learner will be inflexible, and completely independent of his responses. The second additional mode involves a responsesensitive program, which contains the necessary logic to branch (e.g., for enrichment or remedial purposes) based on the student's ongoing course achievement and his pre-course knowledge base. Here, although the computer program tailor-makes the instruction provided to each student, based on continually-updated course-achievement information, the learner has no option to tell the program how he would like it to interact with him, or what he would like it to offer. After these three different modes of CAl have been implemented, they will be compared with each other in terms of learning speed and quality. Each student's performance will also be examined in relation to certain personality characteristics: for example, to see whether certain types of individuals habitually do better in a highly structured, nonpermissive learning environment. range of research efforts. Hedl, in his doctoral research under the contract, has demonstrated the feasibility and validity of an interactive approach to the individualized assessment of intelligence. Test items from the Slosson Intelligence Test, developed in 1963, were individually presented on a CRT. Students typed in their answers for immediate computer evaluation. The answer-analysis algorithm was based upon a key word/phrase dictionary for each item, which was developed from previous test-item protocols. The computer in this case, for the first time, was used for automatically administering an intelligence test, and for reaf-time response-evaluation. If a student's answer was either correct or incorrect, the program moved to the next item. If the answer was interpreted as partially correct, the computer instructed the student to explain more fully his response. If time limits for a given item were exceeded, the computer asked the learner to "please answer the question or type pass," and then gave him another chance at the question. If time ran out again, the item was scored as wrong, and the program went on to the next item. The computerbased version of the Slosson Intelligence Test was experimentally compared with the oral administration of the traditional Slosson Test, as well as with the Wechsler Adult Intelligenc~ Scale (WAIS). The computer-based Slosson Intelligence Test correlated .75 with its traditional version. Equivalent concurrent validity relationships with the WAIS, for a college population were: a .54 correlation between the WASI and CB-SIT; and a .52 correlation between the WASI and the traditional SIT. Anxieties In other studies under this'FSU contract, measures of both "trait anxiety" and "state anxiety" were taken of students engaged in learning mathematical material in a CAl mode. According to Dr. Charles Speilberger of FSU, who first conceptually differentiated these two anxiety conditions, "trait" anxiety represents the anxiety potential or proneness of an individual, or in other words, how likely he is to develop anxiety in situations commonly thought to provoke it. On the other hand, "state" anxiety is a temporary, transitory condition of actual apprehension and heightened autonomic nervous system activity. The common psychological test for measuring anxiety, the Taylor Manifest Anxiety Scale, seems to measure trait anxiety, even though Taylor, its author, propounded.a theory based on state anxiety. Taylor never conceptualized two different dimensions of anxiety. The CAl math learning investigations showed that high state-anxiety students make more errors on the difficult learning material than do low state-anxiety learners. On the easier material, both stateanxiety levels did equally well. The trait-anxiety level was not found to be related to performance. Further FSU work on the effects of trait and state anxiety on CAl performance is more complicated, combining the types of anxiety with types of material (non-technical vs. technical) and various types of responses the subjects are called upon to make. Results here have been difficult to interpret because of interaction effects. More research is planned in this area. Curiosity? Assessment of Intelligence A Florida State University (FSU) investigation in CAl was established as part of the THEMIS program. Because of this heritage, it deals with a broad 12 The FSU researchers conceptualized curiosity as also being either trait curiosity or state curiosity. A "State Curiosity Scale" (SCS) was developed to measure this type. Since curiosity is a motiCOMPUTERS and AUTOMATION for January. 1973 vational construct, it can aid in stimulating the acquisition of knowledge or skills (which is, after all, the aim of all training). The particular type of curiosity studied by FSU, that most relevant to the learning process, was given the fancy name of epistemic curiosity, which merely referred to knowledge-seeking curiosity behavior. Research by FSU indicated that, when levels of curiosity are high, levels of anxiety are low. Given the debilitating effect of high-anxiety on performance and mental functioning, it can readily be seen that maximizing curiosity to minimize anxiety has definite implications for an optimal learning environment. Computer-Managed Instruction Project ENRICH, another major FSU research director, refers to a CAI/CMI effort undertaken by the Naval Reserve Training Facility (NRTF) in Tallahassee with the very close support of the FSU CAl Center. What is CMI? It stands for Computer-Managed Instruction, and, in contrast to CAl, refers to the off-line use of the digital computer to collect and analyze data about a student's cumulative performance and session-to-session learning progress, and then to diagnose his learning problems and make individualized decisions with regard to the optimum next learning step for the trainee. In CMI, then, the computer is not in the loop with the learner; rather, it serves as a record keeper, test scorer, decision-maker, and selector of appropriate remedial material. Although CMI can playa valuable role in the instructional domain, the technology behind using a computer mainly to store information and process data is not really central to instructional psychology or the tutorial side of education. The FSU research involved both CAl and CMI, in that it focused on using the computer to manage the training of, and do some instruction for, Seaman Recruit Reserves in the subject of Basic Military Requirements (BMR). The material programmed on the computer by the NRTF was taken from the Test Manual of the BMR Correspondence Course for advancement to pay grade E-2. Part of the material was taught on a CRT display under computer control. Part was monitored self study, assigned by the computer, and part was homework to read selected BMR chapters or to complete Correspondence Course assignments. The effectiveness of the program was determined by comparing the performance of the Seaman Recruits trained with CMI procedures to that of recruits of comparable ability who were conventionally trained at NRTF, Tallahassee, during previous years. The main measure of performance achieved was the Standard Navy Advancement Examination for Seaman Apprentice. Unfortunately, although 30 Seaman Recruits were requested, only six were made available. Although their average score on the final exam was no better than the average of the Seaman Recruits in the comparison group, they reached this level of achievement in about 33% less time. Project ENRICH has demonstrated the potential value of computer-aided instruction and management in training Naval Reserve personnel. The results suggest that it would be worthwhile to carry out more definitive studies to determine the range of useful application of computer-assisted procedures in various types of Navy training programs. Assessing Effectiveness There are several directions in CAl that could usefully be emphasized in the future. To permit optimum utilization of the computer for instruction (rather than merely use it as an automated textCOMPUTERS and AUTOMAliON for January. 1973 book), it is desirable to develop improved methods for assessing learning progress and adjusting the pace of the computer teaching process accordingly. Learner control of the tutorial process would take into account the fact that the student himself may very well know better than anyone else when he is prepared to tackle the next task. Research is also required to show what types of information and skills can best be taught by computer, and to determine to what extent the costs involved can be amortized through many additional uses of the computer both ashore and onboard ship. Examples are record keeping, job aids, instant technical manual update, and the like. The possibility of using satellites for remote-source instructional input to the computer on a ship should also be investigated. Another effort which could be pursued with advantage would explore the use of the visual-display capabilities of computers in CAl. Computer graphics might allow evaluation of the extent to which "one picture is worth a thousand words" in a particular pedagogical process. The computer can, among other things, show three-dimensional representations, move complex figures through space, and depict the flow of electricity in electronic circuits. Finally, there is need to evaluate the instructional effectiveness of CAl relative to conventional approaches. CAl, used in its most flexible way -interactively, with learner control -- calls for a continual restructuring of content to adapt in real time to a students' needs and abilities. In comparisons of this approach to older methods, new kinds of base-line criteria may be required. Obviously, cost, although not an instructional criterion, will ultimately be a significant consideration. 0 Unsettling, Disturbing, Critical Computers and Automation, established 1951 and therefore the oldest magazine in the field of computers and data processi ng, believes that the profession of information engineer includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: -- The reliability and social significance of pertinent input data; -- The social value and truth of the output results. In the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. Accordi ngly, Compu ters and Au tomati on publi she s from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we seek to publish what is unsettling, disturbing, critical -- but productive of thought and an improved and safer "house" for all humani ty, an earth in whi ch our chi ldren and later generations may have a future, instead of facing extinction. The professional information engineer needs to relate his engineering to the most important and war, most serious problems fn the world today: nuclear weapons, pollution, the population explosion, and many more. 13 The Social Responsibility of Computer Specialists Dr. Harvey S. Gellman DCF Systems Ltd. 74 Victoria St. Toronto 210, Ontario, Canada "We must recognize that the computer specialist that develops a system used by the public will certainly affect the pUblic. ... The unfortunate thing about technology is that the adverse effects tend to show up too late." I would like to begin this article by asking a question: Can you, the reader, identify any connections or similarities among the following items? Item 1. The New Yorker magazine in its issue of November 21, 1970 1 bemoaned the fact that the wondrous diversity of strange names in a big, broad and once generous country like the United States was being squashed by the computer. It refers to ominous signs that people with long names now face censorship by truncation -- at least, in New Jersey. The magazine describes a letter received by an individual from the Assistant Director of the New Jersey Division of Motor Vehicles. Part of the letter states that " ..• because of space limitations, our electronic equipment cannot produce your name on your license in the exact manner you have requested. Only one first name of not more than nine letters, one middle initial and a surname of no more than thirteen letters can be printed on the driver license or registration certificate. " ••• there are lengthy names which cannot be printed in their entirety. In these cases, the last letters will be abandoned." Item 2. A few years ago, I went to the Toronto Airport to meet my son who was returning from New York. When he was not among the arriving passengers on his scheduled flight, Iwent to the airline agent to find out whether he was booked on the next flight. The airline agent was able to press a few buttons on the keyboard of the computer terminal and within seconds was able to tell me that my son was on the next flight and would be arriving within the hour. I found that computer service useful and impressive. Item 3. About two years ago a Federal Government department in Ottawa hired a new employee to fill an important engineering position. This man refused to apply for a Social Insurance Number because he felt that it would reduce his worth as a human being. The man's boss tried to help him achieve his objective, only to learn that if a Social Insurance Number was not issued, the man could not participate in the Federal Government's pension plan. After a lengthy exchange of correspondence and noble efforts, the boss finally decided to issue a special number on behalf of the man (without the man's knowledge) to prevent the loss of pension benefits. Based on a talk before the Toronto Section of the Canadian Information Processing Society. November 1972 14 Item 4. The Apollo space missions would not have been feasible without computers. Item 5. About a year ago, a newspaper account 2 told of a man who never had an oil company credit card, but kept receiving bills from the company. He wrote several letters to the company, but his letters to the credit department went unanswered and the newspaper quoted his as saying, "It is as if I were not writing to anyone at all." Similarities or Connections? Now, let me repeat the question I asked at the beginning. Can you identify any connections or similarities among the items I have just described? Are there any common threads that link them? You will probably be able tospot several common threads, but I would like to select two: • First, computers can have profound effects on people; and these effects can be beneficial or harmful. • Second, excessive emphasis on a systematic approach and a careless use of computers can erode our humanity. My objectives in this article are: • to discuss some effects of computers; • to show that computer specialists play a dominant role in determining how computers affect people; and • to discuss the computer specialist's responsibility to society. Because of the computer's awesome speed Clnd power, many people are beginning to realize that huge files containing information about people can be assembled, and they can influence us in profound ways. For example, we are not too far away from being able to Harvey Gellman is President of DCF Systems Ltd., a company of management consultants that specializes in computer information systems. He holds a Ph.D. in Applied Mathematics from the Uni versi ty of Toronto. DCF Systems is the Consulting Division of AGT Data Systems Ltd., of which Dr. Gellman is a Vice-President a nd Director. Dr. Gellman ha s served onmany national and provincial government commissions, and held positions of leadership in the management consultant field. In 1966 he was named winner of the International System Award of the Association for Systems Management, the first Canadian to be so honored. COMPUTERS and AUTOMATION for January. 1973 have a credit card computer system that could know when Mr. Smith entered a highway, where he got off, what he bought at the liquor store, who paid the rent for the girl in apartment 4B, and the hotel at which Mrs. Smith spent the rainy afternoon last Sunday. Does this sound farfetched? It is not! But I believe that it is important to insure a personal identification number is not adopted Canada either wilfully or by default, without a examination and public debate of its merits and tential adverse consequences. that in full po- Some Canadian History Stolen Credit Cards Mr. Milton Lipson, the vice-president in charge of corporate security at American Express, is proud of his computers and especially proud of their ability to track people who use stolen or invalid cards. He claims and can demonstrate that his system can track a person using a 'flagged' credit card with a time delay of less than twenty-four hours. 3 Some of you may recall the news reports last year when Yves Geoffroy asked for and was granted Christmas leave from a Canadian Federal penitentiary to marry. Geoffroy decided not to return to prison but his use of an American Express credit card led police to his hideaway in Spain. 4 My reason for telling you this is not to steer those of you who want to steal with credit cards away from American Express and towards another credit card. I merely want to demonstrate that today's computers are capable of keeping track of our actions. Valid Credit Cards In passing, I might ask, isn't it ironical that the American Express Company has a more effective computer system to handle its stolen credit cards than to handle its valid credit cards? In fairness, I should add that the American Express billing system is much better today than it was two years ago and appears to be improving steadily. Some people say that an honest person does not need to worry about a computer's ability to track him, or about the existence of massive computer files containing information about him. But who is to say what constitutes honest or proper behaviour? The things we do today may be considered acceptable today, but will they also be acceptable ten or twenty years from now? Blacklists For example, there were many talented and creative people in the United States during the depression years who were attracted to communist organizations because their failure to find employment led them to become disillusioned with the free enterprise system. In the early 1950's, some of these people found themselves "blacklisted'" and unable to find work because of their earlier political affiliations. And yet in 1972, the President of the United States visited Communist China and all the writers and actors who were formerly "blacklisted'" are now absolved of their old "crimes". Unique Personal Identification Number Some computer specialists I have spoken with are not concerned about the introduction of a universal personal identification number and many are advocating that the Social Insurance Number should be used in Canada for this purpose. They argue that if a unique personal identification number were available and used widely in Canada, there could be economic benefits from using these numbers to exchange data among various governmental and commercial organizations, such as credi t bureaus, chartered banks, etc. I expect to see increasing pressure from commercial organizations for the adoption of such a number. COMPUTERS and AUTOMATION for January, 1973 In the Canadian House of Commons on April 8, 1964, Mr. Diefenbaker, the leader of the Opposition, asked Mr. Pearson, the Prime Minister, whether the Social Insurance Number would be used for income tax records. Mr. Pearson replied, "Certainly not". On December 20, 1967, Mr. J. E. Pascoe, the Member from Moose Jaw-Lake Centre, asked Mr. Pearson, the Prime Minister, "Is it now Government policy to make it mandatory for all Canadians to obtain social security numbers before filing this year's income tax returns, as indicated in a recent notice sent out by the Department of National Revenue?" Mr. Pearson replied, "I would like to look into this matter, Mr. Speaker, but my impression is that this is the law now." The revised Statutes of Canada of 1970 dealing with income tax state clearly that, "Every person who has filed a return of his income for a taxation year after 1966 and has failed to show therein the Social Insurance Number that has been assigned to him or for which he is required by this section to apply shall be deemed to have failed to complete the information on a prescribed form as required by or pursuant to section 49. 1966-67, c.91, s.21." So you see, when some people argue that we have nothing to worry about as long as we have a benevolent government, I would ask, "Do you consider Mr. Pearson to be malevolent?" And yet, this development, in which Pearson played a role, could prove harmful in the-future. I submit that every citizen has a responsibility to speak out against the politicians and bureaucrats who think nothing of infringing on a person's freedom, liberty or privacy. Potential Effects of Technology We need to be concerned about the potential effects of technology on our society. We can see examples of the effects produced by such technological developments as the automobile and television. When we look at computer technology we must admit that it tends to make people depend on machines instead of people. It can therefore drive people apart and make our society less humane. Some people argue that computer specialists do not have any significant effects on society. They equate the computer specialist with the mathematician. But we must recognize that the computer specialist who develops a system used by the public will certainly affect the public. A responsible computer specialist will say, "Computers are tools like bridges. The bridges we build must carry people and we do not want them to crash." The quality of the systems produced by computer specialists, and the use to which these systems are put, will determine whether they have good or bad effects on society. Adverse Effects are Late to Appear The unfortunate thing about technology is that the adverse effects tend to show up too late. They are rarely visible in the early stages. So, if we let our information systems develop haphazardly we run the risk of losing control of our computer systems. 15 If the computer specialist does not exercise social responsibility, he may find himself suffering both as a computer specialist and as a human being. As a computer specialist, he may find himself coming under government regulation. As a human being, he should never forget that bad systems can affect him adversely as a citizen. The growth of consumerism is not a passing fad and we may get government regulation if we do not improve our computer systems. Dehumanizing A recent survey conducted by the American Federation of Information Processing Societies and Time magazine 5 showed that 54% of the respondents believe computers are dehumanizing people and turning them into numbers. Sixty-two percent are concerned that some large organizations keep information about millions of people. In addition, 53% believe computerized information files might be used to destroy individual freedom; 58% feel computers will be used in the future to keep people under surveillance. About a year ago, there was a news report 6 of a lady who received a bill from a department store for $369.78. She had made no purchases. The store threatened to sue her. The matter was finally settled, but the lady believes that her credit record has been damaged with other stores. Ralph Nader's Suggestion Ralph Nader has commented on this problem7 and has suggested that it is not a computer problem, but a department store problem. He suggests that we need to have complaint centres manned by citizens. Many people respect Ralph Nader. I wonder what computer specialists will do when he decides to tackle the computer community? I believe it would be a pity if the computer community behaves irresponsibly and brings on itself government regulation. If the picture I have painted so far appears unduly gloomy, let me make a few comments to balance the perspective. I am basically quite optimistic about the future and firmly believe that most cdmputer specialists do and will continue to behave responsibly towards society. I do not agree with the prophets of doom who see nothing but chaos and destruction in our world. These prophets of doom tend to ignore man's ability to adapt to change. For example, the New York Times book review of The Limits to Growth, a gloomy report on the predicament of mankind, stated: 8 "If the telephone company were restricted to turn-of-the-century technology, 20 million operators would be needed to handle today's volume of calls. Or, as British editor Norman Macrae has observed, an extrapolation of the trends of the 1880's would show today's cities buried under horse manure." Kind-Hearted AND Competent Most computer specialists whom I know are kindhearted. But it is not enough for them to have good hearts, they must also have competence. I do not see how we can have effective systems that produce beneficial results unless the computer specialists working on those systems are competent. In fact, if I had my chOice, I would prefer them to be excellent rather than merely competent. / To be excellent in something, a person must have several essential characteristics. First, he must have talent for the work he is doing. Second, he must enjoy what he is doing. Third, and perhaps most important, he must be a fanatic. A fanatic is someone who has excessive enthusiasm. 16 There appears to be a trend today for people to strive for jobs which are enjoyable. But you cannot have excellence if you insist that your work must be completely enjoyable. An excellent athlete has to go through a lot of hard work and painful conditioning exercises in order to equip himself to perform excellently. The Pianist Gieseking I understand that the wonderful pianist, the late Walter Gieseking, used to practice diligently. He was not satisfied that he had mastered a piece of music until he could play it twenty. consecutive times without a single error. Much as Gieseking probably enj oyed playing the pi ano, I am sure that these practice sessions could not have been pure joy for him. And yet, in my opinion, the effort was worthwhile because some of his recordings are rare examples of excellence that have given pleasure to many listeners. The point is that there is no such thing as a perfect job -- a job that has only pleasure and no pain. And yet, many people today are looking for jobs that are constantly challenging, interesting and enj oyable. I know some computer specialists who are good performers as long as they are working on the interesting parts of a project, but they lose interest artd perform badly when the time comes to complete the necessary detailed work. They are not interested in the details because working on details is not challenging enough for them. Achieving Excellence Fortunately, I have met many computer specialists, both young and old, who have a realistic recognition of the necessary joys and pains of their work and who perform with great competence. I mentioned earlier that to achieve excellence a person must be a fanatic. I believe this is true, but unfortunately most fanatics are not easy to live with; so I would be willing to settle for a high level of competence and would not insist on excellence. But it is important to emphasize that without a high level of competence, the computer specialist cannot fulfill his duty to society because the results he produces will be deficient. Competence is essential, but it is not enough. The computer specialist should also have a high level of integrity and ethical standards. The Aircraft Brake Scandal In April, 1972, Harper's magazine published an article entitled "The Aircraft Brake Scandal".9 A major American corporation received a contract from an aircraft manufacturer to build brake assemblies for a new Air Force plane. The brake was designed by one of the company's most capable engineers, and he in turn assigned the task of producing the final production design to a newcomer in the company. The new engineer conducted some tests of the prototype in accordance with the design and after three prototype models of the brake system had burned out, he realized that the fault lay not in defective parts or unsuitable lining material but in the basic design of the brake itself. The brake design should have included five disks instead of four in order to provide enough surface area to stop the aircraft without generating the excessive heat that caused the linings to fail. COMPUTERS and AUTOMATION for January, 1973 The new engineer took his problem to his boss who had designed the brake. but his boss was too proud to admit that he had made a mistake. During the next several months~ many people in the corporation knew of the problems but kept hiding them from the customer. trying to rationalize test data to make things look good. Finally. after several near airplane crashes. the young engineer and another member of the project team told the customer what was happening. Both men resigned from the company. The young man was hired by the customer. The other man did not have a university degree and found it more difficult to find employment. He turned to journalism and is the author of the article in Harper's. .. Computer specialists should be less concerned 'wi th the forms of professionalism and more with its substance. The computer specialist can only become a professional when he demonstrates the abilities of a professional. ProfessionalS are known as professionals because of their performance records. I believe that the various associations of systems and computer specialists can play useful roles by helping their members earn professional status in the eyes of their customers. They can do this through education, through development of performance measures and codes of ethics. The associations could provide guidance to their members on what is right and wrong, and I believe that such guidance could have a pervasive influence on the members' employers. Lack of Integrity Performance Measurement and Social Responsibility Now you might ask. ,what is the connection between the Aircraft Brake Scandal and the integrity of computer specialists? I suggest that the Aircraft Brake Scandal was caused by a lack of integrity in the design engineer •. I have seen several cases where computer specialists have been too proud or afraid to admit their mistakes and this has created severe difficulties for their employers. For exampIe. in one case. a computer sys terns manager ,refused to admit to his employer that he and his team were not ready to begin operations on a newly installed computer. As a result. the company found itself operating with a deficient system. It lost control of its warehouse shipments and its accounts receivables and it took a considerable amount of time and money to regain control. I know that it is not easy to measure the performance of systems people, but it can be done. There are ways of separating the competent people from the incompetent people, and I believe that the "professional associations" should play leading roles in maintaining some kind of current record about a person's performance. Integrity implies that the computer specialist should be more service-centred and less self-centred. He should be more willing to let his customers become involved in specifying what they want in their systems. Some computer specialists behave like some medical doctors~ When a friend of mine was an army rookie. he had a cold and went to the army doctor. The doctor asked him what was wrong and my friend said. "I have a cold." The doctor barked. "Just tell me your symptoms. I'll decide whether you have a cold." In a similar way, some computer specialists try to keep their customers in a subordinate position. I find it hard to see how the computer specialist's employer can achieve full benefits from his computer systems if the computer specialist is not interested in serving the users of the systems. I think it is fair to say that most computer specialists are intelligent and industrious. Moreover, most of them cherish their freedom. This is shown by their hatred of standards and rules for documentation. If computer specialists cherish their own freedom, then they should be willing to protect the freedom of computer users and citizens who might be adversely affected by computer systems. Specialist vs. Professional You may have noticed that I have kept referring to the computer specialist and have not used the term computer professional. We hear a lot of talk about professionalism. Every person working for a living wants to be called a professional. We have professional writers. golfers, salesmen, nurses, hockey players, musicians, doctors, lawyers and soldiers. It is therefore difficult to produce a good definition of the word professional. The definition which I prefer is: "A. professional is someone who can do something better than most other people, even under adverse conditions." COMPUTERS and AUTOMATION for January, 1973 I would like to conclude wi,th a brief summary of my main points: • Computers can have profound effects on our lives, either beneficial or harmful. • Computer specialists can playa dominant role in determining what these effects will be. • If the computer specialist does not fulfill his responsibility to society he will suffer as a human being and as a computer specialist. • The essential requirements for computer specialists are competence and integrity. • "Professional associations" can help their members in both of these areas. I still believe that most Canadians retain a steadfast respect for the rights of the individual. I also believe that most computer specialists are good people. They know they should pay more attention to the goals of their systems and less attention to their tools; otherwise they may become the tool of their tools. We computer specialists know that in the long run, what is good for computer users will also be good for us. We know that we need to preserve our competence and integrity, and we know how to do it. All we need is the will to do it. References 1. The New Yorker, November 21, 1970, p. 55. 2. Hanlon, J., Computerworld, September, 1971. 3. Powledge, F., "Learning to Live with the Credit Card", Esgui re, September, 1971. 4. The Toronto Star, March 8, 1972. p. 10. 5. "A National Survey of the Public's Attitudes Towards Computers". A joint project of the American Federation of Information Processing Societies and Time Magazine, 1971. 6. Ross, I., "The Credit Card's Painful Coming-ofAge", Fortune, October, 1971, p. lOB. 7. Nader, R., "Computers and the Consumer", Computers and Automation,· October, 1970, p. 21. B. The Financial Post, April 22, 1972, p. 6. 9. Vandi vi er, Kermit, "The Ai reraft Brake Seanda 1" Harper's magazine, April, 1972, p. 45. [J 17 DATABANKS IN A FREE SOCIETY: A Summary of the Proiect on Computer Databanks Professor Alan F. Westin Department of Political Science Columbia University 420 West 118th Street New York, N. Y. 10027 and many associates "Our task is to see that appropriate safeguards for the individual's rights to privacy, confidentiality, and due process, are embedded in every major record system in the nation." Based on a summary of the Project on Computer Databanks and of its report "Databanks in a Free Society" published 1972 by Quadrangle Books, a New York Times Company, 330 Madison Ave., New York, N.Y. 10017. The United States has become a records-oriented society. In each major zone of personal and CIVIC life (education, employment, credit, taxation, health, welfare, licensing, law enforcement, etc.), formal, cumulative records are assembled about each of us by hundreds of private and government record-keeping organizations. These personal histories are relied on heavily by the collecting organizations in making many decisions about our rights, benefits, and opportunities. Informal networks for sharing recordinformation among public and private organizations have become a common feature of organizational life heavily dependent On credentials. During the past two decades, as most government agencies and private organizations have been computerizing their large-scale files, the American public has become concerned that dangerous changes might be taking place in this record-keeping process. Because of the computer's enormous capacities to record, store, process, and distribute data, at great speeds and in enormous volumes, many people have feared that far more personal data might be assembled about the individual than it had been feasible to collect before; that much greater sharing of confidential information might t~ke place among the holders of computerized records; and that there might be a lessening of the individual's ability to know what records have been created about him, and to challenge their accuracy or completeness. The book Databanks in a Free Society (currently being published by Quadrangle Books, a New York Times subsidiary) is the report of the first nationwide, factual study of what the use of computers is actu~ doing to record-keeping processes in the United States, and what the growth of large-scale databanks, both manual and computerized, implies for the citizen's constitutional rights to privacy and due process. This article is a summary of the book. The book also outlines the kinds of public policy issues about the use of databanks in the 1970's that must be resolved if a proper balance between the individual's civil liberties and society's needs for information, is to be achieved. How the Study was Conducted Alan F. Westin is Professor of Public Law and Government at Columbia Uni versi ty and a member of the District of Columbia Bar. For the past two decades he had written about the law and politics of civil liberties and civil rights. In 1968 he received several nati onal awards for hi s book Pri vacy and Freedom, a comprehensive study of the social and political functions of privacy in a democratic society. Prof. Westin is a member of the National Academy of Sci ences' Computer Sci ence and Engi neering Board and served as Director of the Academy's Proj ect on Computer Databanks, 1969-72. He is also Chairman of the American Civil Liberties Union's Pri vacy Commi ttee and a member of the ACLU National Board. 18 The book is the report of the "Project on Computer Data Banks", a three-year research study conducted under the auspices of the Computer Science and Engineering Board of the National Academy of Sciences, under grants of $164,000 from the Russell Sage Foundation. The Director of the Project was Dr. Alan F. Westin, Professor of Public Law and Government, Columbia University, and author of Privacy and Freedom, published in 1967. An inter-disciplinary staff of seven scholars from the fields of law, computer science, and the social sciences collaborated in the research. The project received continuing guidance not only from the Computer Science and Engineering Board but also a special Advisory Board of 18 prominent figures in public life whose views spanned the COMPUTERS and AUTOMATION for January, 1973 full spectrum of opInIon on issues of databanks and civil liberties.* The final report of the project was written by Dr. Westin and Mr. Michael A. Baker, Assistant Director of the Project and an Instructor in Sociology at Brooklyn College of the City University of New York. Mutual of Omaha Insurance Company R. L. Polk & Company Massachusetts Institute of Technology Church of Latter Day Saints Office of Research, American Council on Education Kaiser-Permanente Health Plan Sources The major sources collected and used by the Project include: 1. Documentary materials on computerized record systems in more than 500 government agencies and private organizations. 2. Detailed on-site staff visits to 55 of the most advanced computerizing organizations, ranging across the most sensitive fields of personal record-keeping. 3; Replies from over 1500 organizations in a national mail survey of developments in computerization and record-keeping among government agencies and private organizations. 4. Extensive interviews with officials from computer companies, software houses, systems consulting firms, industry associations, civil liberties groups, labor unions, consumer organizations, minority-rights organizations, and professional associations. 5. Legal, legislative and regulatory-agency materials dealing with databank issues in 25 distinct major fields of personal record-keeping. 6. Materials and interviews on the state of databank developments and regulatory controls in 23 foreign nations, for purposes of comparison with the United States. Organization of the Report The Report is organized into five parts: Part I presents a brief, orienting discussion of computer systems and civil liberties concepts for general readers. Part II consists of "profiles" of 14 governmental, commercial, and private organizations, drawn from the 55 to which the Project staff made on-site visits. Each profile describes the nature and function of the organization, its pre-computer record-keeping, its move into computer usage, the effect of automation on its record-keeping about people, previous civil liberties issues involving the organization's manual record-keeping, the effect of computerization on civil liberties protections, and the organization's plans for further computerization in the next five years. The 14 organizations given this detailed treatment are: The U.S. Social Security Administration The F.B.I. 's National Crime Information Center Kansas City (Missouri) Police Department New York State Department of Motor Vehicles City of New Haven, Connecticut Santa Clara County, California Bank of America TRW -- Credit Data Corporation * Names of staff and Advisory Board members appear later in this summary. COMPUTERS and AUTOMATION for January. 1973 Part III has three chapters which present and analyze the Project's principal findings. These include an overview of what kinds of files have and have not been computerized in advanced organizations; an analysis of computer effects on civil liberties that are not taking place as yet; and a description of those changes in record-keeping that the use of computers and communication systems is producing in these organizations. Part IV is an analysis of the way in which the reception of computer technology is affected by organizational, legal, and socio-political factors, followed by a forecast of developments in new computer and communications technologies that are likely to occur in the remainder of the 1970's, and an analysis of their implications for civil liberties interests. Part V discusses public policy choices in the 1970's in light of the project's findings and forecasts. The first chapter analyzes the larger socio-political significance of the computer's arrival in the late 1950's and 1960's; it goes on to suggest the basic civil liberties principles that ought to be followed when seeking to safeguard citizen rights in large-scale record systems, especially in the increasingly computerized sectors of American organizational life. The final chapter of the report presents an agenda for the 1970's, identifying six areas of priority for public policy and civic action. Three appendixes to the report present: the results from the Project's survey of organizations; an analysis of public opinion literature on privacy and the computer; and information about the experience of other advanced industrial nations in dealing with the databanks-and-privacy problem. Highlights of the Report A great many commentators have warned that the spread of computers is fundamentally altering the balance between information policies of organizations and individual rights to privacy that marked past eras of record-keeping. Compared to what was done in the manual era, it is said, the new capacities of the computer inevitably lead organizations: to collect more detailed and intrusive personal information about individuals; to consolidate confidential information from previously separate files; and to share confidential personal data with government agencies and private organizations that had not received it before. The Project's findings from visits to 55 organizations with highly advanced computer applications is that computerization is not yet having such effects in the overwhelming majority of such organizations. For a combination of technological and organizational reasons, central databank developments are far from being as advanced as many public commentaries have assumed. Organizations have so far failed to achieve the "total" consolidation of their information about individuals which raised civil liberties alarms when such goals were announced in the 1960's by various government agencies or private organizations. 19 Continuance of Policies Further, in computerizing their records on individuals, organizations have generally carried over the same policies on data collection and sharing that law and administrative traditions in each field had set in the pre-computer era. Where new law or practices have evolved to protect individual liberties over the past decade, organizations with computerized systems have followed such new policies as fully as those that still use manual files and procedures. Even the most highly computerized organizations continue to rely heavily on manual record-keeping and retain in their paper files the most sensitive personal information they possess. Another widely held fear is that computerization makes it more difficult for the individual to know what is in the file about him, to have errors corrected, or have the data erased where public policy specifies that certain information about an individual's past should be ignored. The Project's inspection of advanced systems showed that notice to the individual about a record's existence, opportunity to inspect and challenge that record, and policies as to the removal of out-of-date or irrelevant information were not being substantially altered by computerization. Where policies affording individuals rights of due process such as the above had been provided in an organization prior to computerization, those rules are being followed in the new computerized systems as well. Where no such rights were given, the adoption of computers has not made the situation either worse or better. Neither has computerization introduced impersonal decision-making in systems where this was not present before, nor forced organizations into greater reliance on "the record" in making decisions about clients, customers or citizens. Where abuses along these lines were present in computerized systems -- raising serious due process questions -- they had been carried over from the high-volume "processing" of people in the manual era. Public Misunderstanding Over and over again, the Project's findings indicate profound public misunderstanding about the effect of computers on large scale record systems. To some extent, the inflated claims and proposals of organizational managers about the capacities of their computer systems helped to generate what were in fact baseless concerns for privacy on the part of the public. In addition, as the Report shows with respect to law enforcement uses and airline-reservations and charge-card systems, many commentators on computers and privacy issues have failed to do adequate research into the actual operations of systems about which they write, and have presented entirely incorrect pictures to the press and public about how these computer systems work. The danger in this, the report points out, is that we may give up the fight in the belief we have already lost: If we assume that computer users are already doing things that they are not, we risk surrendering without a fight the border between properly limited and surveillance-oriented computer applications ••• ~ The question of what border control measures should be adopted can hardly be understood and properly considered •.. if the public and opinion leaders assume that the borders have already been obli terated. 20 Efficiency Computerization in advanced organizations is producing changes in record-keeping methods that can increase the efficiency with which organizations carry out their basic decision-making about the people they process or serve. Computerization is making it possible for many organizations to: maintain more up-to-date and complete records; obtain faster responses to inquiries about a given individual; and make more extensive use of information already in the files. Computers have also made possible dramatic expansion of networks for exchange of data among organizations that have shared data since precomputer days; and the creation of some large data bases of information about people that would not have been feasible without automation. These changes have been felt already in police information systems, national credit reporting systems, charge card systems, and others. Data-Sharing Looking at technological trends for the remaining years of the 1970's, the Report forecasts that while there will be important continued increases in computer capabilities, no developments are now foreseeable that will alter the technological, organizational, and socio-political considerations that presently frame the databanks and civil liberties issue. Organizations will have more flexible, reliable, and cost-effective computer systems to use in pursuit of their policies, but these will not represent a radical departure from the computer capabilities presently available. The most important development with implications for civil liberties interests will be an increase in the ease with which data can be shared among organizations which have computers, coupled with a reduction in the cost of doing so. This will make it imperative that legal boundaries as to data-sharing are set as clearly as possible. Augmenting the Power of Organizations The Project concluded that the real issue of databanks and civil liberty facing the nation today is not that revolutionary new capacities for data surveillance have come into being as a result of computerization. The real issue is that computers arrived to augment the power of organizations just when the United States entered a period of fundamental debate over social policies and organizational practices, and when the traditional authority of government institutions and private organizations has become the object of wide-spread dissent. Challenge of Goals Important segments of the population have challenged the goals of major organizations that use personal records to control the rights, benefits, and opportunities of Americans. There is also debate over the criteria that are used to make such judgments (religious, racial, political, cultural, sexual, educational, etc.), and over the procedures by which the decisions are reached, especially those that involve secret proceedings and prevent individuals from having access to their own records. Distrust of Organizational Record-Keeping Computers are making the record-keeping of many organizations more efficient precisely at the moment when trust in many large organizations is low and when major segments of the American population are calling for changes in values that underly various social programs. for new definitions of perCOMPUTERS and AUTOMATION for January. 1973 sonal rights, and for organizational authorities to make their decision-making procedures more open to public scrutiny and to the review of specific individuals involved. Little Legislation Despite the rapid spread. of computers, there has been little so far by way of new legislation, judicial rulings, regulatory-agency rules, or other legal remedies defining new rights to privacy and due process in major record systems. The Report stresses that, because of the increased efficiency of recordkeeping and the growing intensity of the pUblic's concern, the middle 1970's is the moment when lawmakers and the public must confront both long-standing and newly-raised civil liberties issues, and evolve a new structure of law and policy to apply principles of privacy and due process to large-scale record-keeping. The Report identifies six areas of priority for public action, and presents examples of specific policy measures under each of these that ought to be seriously considered by policy makers: Right of Access and Challenge Development of laws to give the individual a right of access and challenge to almost every file in which records about him are kept by city, county, state, or government agencies: At stake here is the possibility that, denied access to records being used for decisions about himself, the citizen is left with "feelings of powerlessness and the conviction that government authority is fundamentally arbitrary." At the very least, citizens ought to know what record systems exist in government agencies. A Citizen's Guide to Files, published at every appropriate level of government jurisdiction, should "provide the citizen with a thorough, detailed and non-technical directory of the record systems that contain information about him, and the general rules under which it is being held and used." Providing adequate due process protection in government files, the Report suggests, is best achieved by assuming that any individual should be able to see and get a copy of any records used to affect him or her personally - wi th the record-keeping agency "bear ing the burden of proving that some specific public interest justifies denying access." Explicit Rules Develop of explicit laws or rules balancing confidentiality and data-sharing in many sensitive record systems that today do not have clearly defined rules: Among these would be rules governing the provision of information to law enforcement agencies from bank accounts, travel and entertainment card records, airline and hotel reservation systems, etc. The Report predicts that one or two large systems will come to dominate in each of these areas. This development will make the individual's account record more comprehensive and a very inviting target for investigators of all kinds. With that rise in sensitivity and attractiveness ought to go legislative enactments spelling out retention and destruction policies, confidentiality rules, and procedures for protecting individual rights when outsiders seek to obtain access for what are asserted to be lawful and necessary purposes. COMPUTERS and AUTOMATION for January. 1973 As a case study in how not to build new record systems, the Report discusses some of the major Administration and Congressional proposals for national welfare reform, which generally hinge on the availability of computers for massive data storage and exchange. Several of the welfare system proposals contain "sweeping authorizations for data collection and sharing but almost nothing by way of confidentiality standards and due-process review procedures." The Report points out that we may be "creating one of the largest, most sensitive, and highly computerized record systems in the nation's history, without explicit protections for the civil liberties of millions of persons whose lives wi 11 be profoundly affected ... " Records of the Wrong Kind Limit the collection of personal information where a proper regard for the citizen's right to privacy suggests that records ought not to be maintained at all by certain organizations, or never furnished for certain uses in the society: Among the examples are the use of arrest-only records in licensing and employment decisions, and the selling to commercial advertising services of names and addresses collected by government under its licensing and regulatory powers, unless the individual specifically consents to such use. In the case of arrest records, the Report stresses that: A democratic society should not allow arrest records to be collected and circulated nationwide with increasing efficiency without considering directly the actual social impact of their use in the employment and licensing spheres, and without examining the possibility that dissemination beyond law-enforcement agencies represents an official stigmatization of the citizen that ought to be either forbidden by law, or closely regulated. Social Policy Increased work by the computer industry and professionals within it on technological safeguards which will make it possible to implement confidentiality policies more effectively than is now feasible: The Report notes that: No 'technological fix' can be applied to the databank problem. Protection of privacy is a matter of social policy, on which computer profes si onal s are fellow-ci tizens, not experts. But the Project calls for more research, development and testing efforts to be undertaken by the computer industry to see that the computer's capacities for protection of confidentiality and insurance of proper citizen access are turned into "available and workable products". Law and public pressure, the Report suggests, require that such measures be taken by managers of sensitive record systems when they are computerized, thereby stimulating the "user demand" to provide a practical market for such devices and techniques. No Extension of Use of Social Security Number Reconsideration by Congress and the executive branch of the current permissive policies toward use of the social security number in an increasing number of government and private record systems: The Report notes that having such a number is not a prerequisite for linking files within or between or21 ~anizations, but notes that a common numbering system clearly makes record linkage easier and cheaper. Further, the Project concludes that resolving the critical civil liberties issues in record keeping "will require that a minimum level of trust be maintained between American citizens and their government. Under these conditions, adopting the social security number as a national identifier or letting its use spread unchecked cannot help but contribute to public distrust of government." Information-T ru st Agencies Experimentation with special information-trust agencies to hold particularly sensitive bodies of personal data: For example, the Report suggests that the handling of both national crime statistics and summary criminal histories ("rap sheets") might be taken away from the Federal Bureau of Investigation and placed in an independent national agency under control of a board that would have public representatives as well as law enforcement officials on it. Such an agency would have to be established "with a clear legislative mandate to be a 'guardian' institution," paying attention to civil liberties interests as well as law enforcement needs. Critical Period, 1973-78 The Report stressed that the next five years would be a critical period in the reception and control of sensitive personal record systems, especially those managed by computers. More sensitive areas of record-keeping are being entered by many computerizing organizations; many larger online (instant access) networks are being brought into operations; and more consolidations of presently scattered records about individuals can be seen as a trend in certain areas, such as criminal justice, credit and financial transactions, and welfare. The Report stresses that unless lawmakers and organizational managers develop proper safeguards for privacy and due process, and create mechanisms for public scrutiny and review, the record systems they are building could sharpen the already serious debate in American society over the way to apportion rights, benefits, and opportuni ties in a credential-oriented society, and leave organizational uses' of records to control individual futures too far outside the rule of law. In its closing paragraphs, the Report sums up the databanks and civil liberties problem as follows: If our empirical findings showed anything, they indicate that man is still in charge of the machines. What is collected, for what purposes, with whom information is shared, and what opportunities individuals have to see and contest records are all matters of policy choice, not technological determinism. Man cannot escape his social or moral responsibilities by murmuring feebly that "the Machine made me do it." There is also a powerful tendency to romanticize the pre-computer era as a time of robust privacy, respect for individuality in organizations, and "face-to-face" relations in decision-making. Such arcadian notions delude us. In every age, limiting the arbitrary use of power, applying broad principles of civil liber~y to the troubles and challenges of that time, and using technology to advance the social well-being of the nation represent terribly hard questions of public policy, and always will. We do not help re22 solve our current dilemmas by thinking that earlier ages had magic answers. Computers are here to stay. So are large organizations and the need for data. So is the American commitment to civil liberty. Equally real are the social cleavage~ and cultural reassessments that mark our era. Our task is to see that appropriate safeguards for the individual's rights to privacy, confidentiality, and due process are embedded in every major record system in the nation, particularly the computerizing systems that promise to be the setting for most important organizational uses of information affecting individuals in the coming decades. Notes Staff and Advisory Bodies to the Project Staff Associates for the Project were: Robert F Boruch, Assistant Professor, Department of Psychology, Northwestern University Howard Campaigne, Professor of Mathematics, Slippery Rock State College Gerald L. Grotta, Associate Professor of Journalism, Southern Illinois University Lance J. Hoffman, Assistant Professor of Electrical Engineering and Computer Sciences, University of California, Berkeley Charles Lister, Attorney at Law, Washington, D.C. Advisory Group The Proj ect had duri ng its exi stence an Advi sory Group that provided the staff with a wide range of diverse viewpoints on the databanks and civil liberties issue and helped shape the project's studies. Members of the Advisory Group were: Edgar S. Dunn, Jr. Resources for the Future, Inc. The Honorable Cornelius E. Gallagher House of Representatives Richard Freund First National City Bank Justice Nathan L. Jacobs New Jersey Supreme Court Nicholas deB. Katzenbach Vice President and General Counsel, IBM Corp. John H. Knowles President, Rockefeller Foundation Arthur R. Mi ller Professor of Law, Harvard University Law School George A. Miller Institute for Advanced Study, Princeton, N.J. Ralph Nader Attorney, Washington, D.C. Arthur Naftalin Professor of Public Affairs, Univ. of Minnesota Anthony G. Oettinger Harvard University John R. Pierce California Institute of Technology The Honorable Ogden R. Reid House of Representatives L. F. Rei ser Corporate Director, Personnel and Industrial Relations, CPC International Inc. Richard Ruggles Department of Economics, Yale University Roderick O. Symmes Director, Data Systems & Statistics Staff, U.S. Dept. of Housing and Urban Development Roy Nutt Vice President, Computer Sciences Corporation [] COMPUTERS and AUTOMATION for January. 1973 ANNUAL INDEX for Volume 21, 1972 of COrn~H~!!!:i! A ASCII, "Amer ican St andard Code for Information Interchange," 21/6B (Aug.), 180 Abzug, Bella, and Helsingen Sanomat, Ian Low, Judy Bellin, Edmund C. Berkeley, "How Fiendish Can You Get?," 21/5 (May), 31 "Academic Computer Practices, and Their Deficiencies," by Dr. Herbert E. Humbert, 21/5 (May), 16 Accounting Principles Board, "IBM's Powerful Partner: The Accounting Principles Board," from Samson Science Corp., 21/ 4 (Apr.), 31 "Achieving 'Personal' Response from a Computer," by Edmund C. Berkeley, 21/3 (Mar.), 6 "The Activities of the Central Intelligence Agency, at Six Billion Dollars a Year," by Edmund K. DeLong, 21/2 (Feb.), 38 ADAPSO, "Justice Department Interested in ADAPSO Hearings," 21/3 (Mar.), 41 ADVANCED ND~IlLES, by Neil Macdonald: 21/3 (Mar.), 45; 21/4 (Apr.), 43; 21/5 (May), 33; 21/ 6 (June). 42; 21/7 (July), 26 "Adversity" (Computer Art), by James Lipscomb, 21/8 (Aug.), 9 "Aerial Photography and Computers Aid the Bat tIe Against Bl ight and Pollution," by Dr. David Landgrebe, 21/1 (Jan.). 48 "Air-Pollution Game To Deal with Environmental Problems," by Prof. Matthew J. Reilly. 21/1 (Jan.),50 "The Alaska Pipeline Heading Lesson." by Stewart M. Brandborg, 21/6 (June). 30 Alexander, Jame s p .. "Operat ion Clean Sweep -- A Ci ty' s War on Crime," 21/2 (Feb.), 51 Algebra, "New Algebra Option Promises Breakthrough in Calculator Programming," 21/8 (Aug.), 44 American Friends Service Cammi ttee, "Pacification: The Story of Ba Toi." 21/7 (July), 37 "American Standard Code for Information Interchange, ASCII," 21/6B (Aug.), 180 Ancient writing, "Deciphering an Unknown Computer Program, as Compared with Deciphering of Ancient Writing," by Edmund C. Berkeley, 21/5 (May). 19 "Annual Index for Volume 20, 1971 and Computer Directory and Buyers' Guide Issue, Vol. 19, No. 6B of 'Computers and Automation' ," 21/1 (Jan.), 25 Anthropology, "The Importance of Being Human," by W. W. Howells, 21/10 (Oct.), 12 "The Antisocial Use of Computers ," by Donn B. Parker, 21/8 (Aug.), ')') Applications: "Barriers in Applying Computers," by Edmund C. Berkeley, 21/7 (July), 24 "Counting the Number of Applications of Computers." by Edmund C. BerKeley, 21/6B (Aug.), 3 "Over 2300 Applications of Computers and Data Processing," by Linda Ladd Lovett, 21/6B (Aug.), 137 Appropriations Commi ttee, "Lead Poisoning: The Hypocrisy of the Presidency, and of the Appropriations Committee of the House of Representatives," by William L. Clay, 21/8 (Aug.), 7 Apti tudes, "Pictorial Reasoning Tests and Aptitudes of People -- III," by Neil Macdonald, 21/2 (Feb.), 29 "Architecture Students Turning to Computer 10 Improve Design, Creativity," 21/5 (May), 42 Arithmetical tables, "Some Basic Ari thmetical Tables," 21/6B (Aug.), 179 Arrests, "Computer Increasinq Criminal Arrests by 10 Per Cent," 21/7 (July), 42 Art contest, "Tenth Annual Computer Art Contest": 21/5 (May), 40; 21/6 (June), 41; 21/8 (Aug.), 8 Art curriculum, "Computer Science Is Added to COllege's Art Curriculum," 21/3 (Mar.), 40 Artists, "Computer Artists," 21/ 8 (Aug.). 19 Ass assination: "Dallas: Who, How, Why? Part II," by Mikhail Sagatelyan, 21/4 (Apr.), 37 "Political Assassination in the United States," 21/5 (May). 7 "The Assassination of Senator Robert F. Kennedy: Proofs of Conspiracy and of Two Persons Firing," by Richard E. Sprague and William W. Harper, 21/9 (Sept.), 24 Association for Computing Machinery, "Horizons and Rebellion," by Edmund C. Berkeley, 21/9 (Sept.), 36 Association of Data Processing Service Organizations, Inc., "Justice Department Interested in ADAPSO Hearings," 21/3 (Mar.), 41 "Association for the Prevention of Doomsday -- News and Ideas," 21/10 (Oct.), 36 Associations, "Roster of Computer Associations," 21/6B (Aug.), 168 Aston, William W., "Personal Rapid Transi t, Computerized, in Morgantown, West Virginia, Part I: The Plan," 21/6 (June), 11 Athearn, Inc., "Computer Keeps 'Railroad' Running Smoothly," 21/3 (Mar.), 40 Axioms, "EDP Axioms -- A Critical Analysis," by W. Leon Sanford, 21/5 (.Ilay) , 12 BR-1018, "Telephone-Sized Computer, BR-1018. Moves Into Production," 21/10 (Oct.), 45 Ba Toi, "Pacification: The Story of Ba Toi," American Friends Service Committee, 21/7 (July), 37 "The Bad Image That Computers Are Earning," from Harold W. G. Gearing and others, 21/4 (Apr.), 29 Baggage inspection, "X-Rays Air Luggage for Bombs at lIigh Speed," 21/5 (May), 43 Banking, "Computers in Banking," by J. Q. Hallam, 21/8 (Aug.), 20 "Barriers in Applying Computers," by Edmund C. Berkeley, 21/7 (July),24 "Baton Houge Moni tors Sewers wi th New Computer System," 21/11 (Nov.), 41 Beauni t Corp., "Color MatChing by Computer Creates a New Business," by J. Mark Raiteri, 21/ 1 (Jan.), 50 Bedside teaching, "University Computer Helps Doctors wi th 'Bedside Teaching' ," 21/11 (Nov.), 42 Bell, Lucy, Mrs., and Mrs. Ruth Shapin, William II. Wynne, Rainer ~1. Goes, Thomas D. Bryant, "Encouragement for the Pursui t of Truth," 21/11 (Nov.), 38 Bell Telephone Laboratories, "No.4 ESS Will Triple Toll Call Capacity," 21/8 (Aug.), 45 Bellin, Judy, and Helsingen Sanomat, Ian Low, Bella Abzug, Edmund C. Berkeley, "How Fiendish Can You Get?," 21/5 (~Iay), 31 "Benchmarking vs. Simulation, tI by Fred C. Ihrer, 21/11 (Nov.), 8 Berezin, Evelyn, "How Technology Is Freeing the Secretary," 21/ 10 (Oct.), 15 Berkeley, Edmund C.: "Achieving 'Personal' Response from a Computer," 21/3 (Mar.), 6 "Barriers in Applying Computers," 21/7 (July), 24 "Bernard L. Barker: Portrait of a Watergate 8urglar," 21/ 11 (Nov.), 26 "Books": 21/10 (Oct.), 34; 21 /11 (Nov.), 40 "Chess and Computers," 21/9 (Sept.), 6 "Common Sense, Wisdom, General Science, and Computers - II," 21/1 (Jan.), 11 "Computers and Spelling," 21/ 11 (Nov.), 6 "The Construction of Living Robots -- Part 1," 21/8 (Au.g.), 27 "Counting the Number of Applications of Computers," 21/6B (Aug.), 3 "The Curse of a Magazine," 21/ 2 (Feb.), 6 "The Death of the Democratic Party Candidate for the Presidency, 1972," 21/5 (May), 6 "Ueciphering an Unknown Computer Program, as Compared with Deciphering of Ancient Writing," 21/5 (.Ilay) , 19 "Doomsday -- Class A Hazards," 21/11 (Nov.), 38 "Eight Hundred People Interested in Mechanical Brains," 21/1 (Jan.), 7 "Fall Joint Computer Conference: Topics," 21/4 (Apr.), 33 "Horizons and Rebellion," 21/ 9 (Sept.), 36 "The House Is on Fire": 21/2 (Feb.), 37; 21/8 (Aug.), 38 "Hurray for the Univac Di vi sian of Sperry Rand," 21/1 (Jan.), 6 "The Most Important of All Branches of Knowledge": 21/ 1 (Jan.), 36; :!1/2 (Feb.), 2; 21/6 (June), 50; 21/7 (July), 7 "The Old Brain, the New Brain, the Giant Brain, and Common Sense," 21/4 (Apr.), 6 "The Pursui t of Truth in Input, Output. and Processing," ~1/8 (Aug.), 6 "The Shooting of Governor George C. Wallace, Candidate for President," 21/7 (July), 10 "The Shortage of Good Typists -- and the JJ Comm"nd," 21/(, (June),6 "Some liard Facts, and What To Do About Them," 21/10 (Oct.), 3 "Statistics -- A Guide to the Unknown," 21/10 (OC t. ), 6 "ZINGO -- A New Computer Game," 21/:! (Feb.), 32 Berkeley, Edmund C., and M. Egan, "Publ ishing Articles on Issues that DOlI't Get the At tent ion They Deserve," :!1/1O (Oct.), 38 Berkeley, Edmund C., and William W. Harper, "Correction and Retraction," 21/12 (Dec.), 21 Berkeley, Edmund C., and Stanley Jaffin, "Missing Issues of 'Computers and Automation'," 21/5 (May), 28 Berkeley, Edmund C., and Jim Johnson, "Subscription Error s: C&A Will Correct," 21/11 (Nov.), 39 Berkeley, Edmund C., and John Kaler, "Unhappy Subscriber to Satisfied One," 21/7 (July), 38 Berkeley, Edmund C., and Arthur Martin, "Computer-Field Information vs. Social Rag," 21/7 (July), 36 Berkeley, Edmund C., and Peter J. Nyikos, "The Neglect of Significant Subjects, and the Information Engineer," 21/7 (July),30 Berkeley, Edmund C., and Frederic O. Parlova, "CDC vs IBM," 21/4 (Apr.). 32 Berkeley, Edmund C., and Montgomery Phister, Jr., "PostMaturity in the Computer Field," 21/12 (Dec.), 6 Berkeley, Edmund C., and Tore Rambol, "On the JJ Command," 21/10 (Oct.), 37 Berkeley, Edmund C., and Helsingen Sanomat, Ian Low, Judy Bellin, Bella Abzub, "lIow Fiendish Can You Get"I," 21/5 (May), 31 Berkeley, Edmund C., and Thomas Stamm, "The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion," 21/7 (July), 32 "Bernard L. Barker: Portrait of a Watergate Burglar," by Edmund C. Berke ley, 21/11 (Nov.), 26 8ernert, Philippe, and Camille Gilles, "Le Francais Qui Devait Tuer Kennedy (The Frenchman Who Was To Kill Kennedy)," 21/12 (Dec.). 38 Black colleges, "Faculty Loans to Black Colleges," by E. Nanas, 21/2 (Feb.), 52 Blight, "Aerial Photography and Computers Aid the Battle Against Blight and Pollution," by Dr. David Landgrebe, 21/1 (Jan.), 48 Blind, "M.1.T.-Braillemboss Being Used by Blind IRS Representative," 21/9 (Sept.), 43 Bache, Raymond E., "The High Cost of Vendor's Software Practices: Why?," 21/12 CDec.), 20 Bombing, "North Vietnam and American Bombing: Six American Government Lies," by Bill Zimmerman, 21/9 (Sept.), 33 Bombs, "X-Rays Air Luggage for Bombs at High Speed," 21/5 Olay) , 43 "Books," by Edmund C. Berkeley: 21/10 (Oct.), 34; 21/11 (Nov.), in Indochina," 21/2 (Feb.), 41 Bress, Dennis L., "Computers and Cartography," 21/8 (Aug.), 25 Bright, Herb, "SHARE and the Mult iply Carry Bug," 21/2 (Feb.), 50 Brooks, Jack, "What Have Computers Done for Us Lately?," 21/ 10 (Oct.), 7 Bryant, Thomas D., and Mrs. Ruth Shapin, Mrs. Lucy Bell, William H. Wynne, Rainer M. Goes, "Encouragement for the Pursuit of Truth," 21/11 (Nov.), 38 "Building Your Own Computer -Part II," by Stephen Barrat Gray, 21/1 (Jan.), 20 Bundy, McGeorge, "Spotlight on McGeorge Bundy and the Whi te House Situation Room, November 22, 1963," by Robert B. Cutler, 21/1 (Jan.), 57 "Bunker-Ramo Activates New Nationwide Market Data System," 21/ 10 (Oct.), 45 Bunker-Ramo Corp., "TelephoneSized Computer, BR-1018, Moves Into Production," 21/10 (Oct.), 45 Burton, Joseph M., Clerk, "District's Superior Court Uses Computer To Keep Track of 100,000 Criminal Cases," 21/2 (Feb.), 52 Bush, "Eight Photographs of a Bush: Pictorial Reasoning Tests -- Part 7," by Neil Macdonald, 21/10 (Oct.), 27 "Business Programmer Exam Announcements and Study Guides Now Avail able," 21/9 (Sept.), 42 Business Week, and Richard E. Sprague, Norman R. Carpenter, "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM - II," 21/3 (Mar.), 19 Busing, '''Computers Enter the Busing Controversy' -- Addendum," by Robert L. Glass, 21/4 (Apr.), 7 Buyers' Guide, "Computer Directory and Buyers' Guide, 1972": 21/7 (July), 50; 21/8 (Aug.), 39; 21/9 (Sept.), 39; 21/10 (Oct.), 34; 21/11 (Nov.), 40; 21/12 (Dec.), 51 Buyers' Guide: "The Computer Directory and Buyers' Guide Issue 1973 -- Notice," 21/6B (Aug.), 178 "Free Entries for Your Organization in the 1973 Computer Directory and Buyers' Guide Issue -- Notice," 21/6B (Aug.), 176 "Buyers' Guide to Products and Services in Computers and Data Processing," 21/6B (Aug.), 63 c 40 Bookstrap, "'Operation Bookstrap' Is lJelping Johnny To Read," by II. J. Peters, 21/1 (Jan.), 49 Brai llembos s, "~1. I. T. -Brai llemboss Being Used by mind IRS Representative," 21/9 (Sept.), 43 Brain, "The Old Brain, The New Brain, The Giant Brain, and Common Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6 "BRAINIAC Homeowner's Protective Kit K40," 21/3 (Mar.), 3 Brains, mechanical, "Eight Hundred People Interested in Mechanical Brains," by Edmund C. Berkeley, 21/1 (Jan.), 7 Brandborg, Stewart M., "The Alaska Pipeline Reading Lesson," 21/6 (June), 30 Branfman, Fred, and Steve Cohn, "The CIA: A Visible Governm('nt "The C&A Notebook on Common Sense," 21/4 (Apr.), 2 "The C&A Notebook on Common Sense, 'Common Sense vs. Catastrophe' ," 21/12 (Dec.), 37 "The C&A Notebook on Common Sense, Elementary and Advanced": 21/1 (Jan.), 2; 21/2 (Feb.), 3; 21/5 (May), 2 "The C&A Notebook on Common Sense, First Year": 21/8 (Aug.), 37; 21/9 (Sept.), 2; 21/11 (Nov.), 2; 21/12 (Dec.), 2 "C&A Notebook on Common Sense: '!low To Be Silly'," 21/12 (Dec. J, 49 "The C&A Notebook on Common Sense: Second Year of Subscription, 197~," "1/12 (Dcc.), 40 "The U,\ Notebook on Common Sense, Vulu",,' I," "1/6 (June), 51 23 Annual Index C&A notebook: "Common Sense, Wisdom, and Information Processing: The Notebook on COIlmon Sense, Elementary and Advanced," 21/7 (July), 6 "Inventory of the Issues of the C&A Notebook on Common Sense, Volume I," 21/5 (May), 3 "Questions and Answers About 'The C&A Notebook' ," 21/4 (Apr.), 3 "Questions and Answers about 'The C&A Notebook on Common Sense, Elementary and Advanced"': 21/1 (Jan.), 3; 21/7 (July), 9 "CAl (Computer-Aided Instruction) Shortens Physician Learning Process," 21/12 (Dec.), 43 "CDC vs IBM -- Correction," from Frederic O. Parlova and Edmund C. Berkeley, 21/4 (Apr.), 32 CIA: "The Activities of the Central Intelligence Agency, at Six Billion Dollars a Year," by Edward K. DeLong, 21/2 (Feb.), 38 "The Central Intelligence Agency: A Short His tory to Mid-1963 -- Part I," by James Hepburn, 21/11 (Nov.), 32 "The Central Intelligence Agency: A Short His tory to Mid-1963 -- Part 2," by James Hepburn, 21/12 (Dec.), 34 "The CIA: A Visible Government in Indochina," by Fred Branfman and Steve Cohn, 21/2 (Feb.). 41 "CalComp Plotter Purchased for Russian Ministry of Chemical Industry," 21/8 (Aug.), 45 Calculator programming, "New Algebra Option Promises Breakthrough in Calculator Programming," 21/8 (Aug.), 44 Camden, N. J., "Computer Increasing Criminal Arrests by 10 Per Cent," 21/7 (July), 42 "Camera Plus Computer for Traffic Regulation: A New Observing System for Multi-Purpose Data Gathering," by Stanley E. Wilkes, Jr., 21/9 (Sept.), 7 "Canadian Colleges and High Schools are Members of Dartmouth's Time-Sharing Computer Network," 21/7 (July), 43 Car maintenance, "Computer Tells Car Owners When Maintenance Is Needed," 21/10 (Oct.), 43 Car production, "Pontiac Dealers Use Computer To Track Car Production for Consumers," by William F. Grimshaw, 21/2 (Feb.), 51 Carpenter, Norman R., and Leon Davidson, John D. French, Philip Neville, "3400 Organizations Required by Court Drder to Furnish Confidential Data to IBM," 21/2 (Feb.), 21 Carpenter, Norman R., and Richard E. Sprague, Business Week, "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM - II," 21/3 (Mar,), 19 Cartography, "Computers and Cartography," by Dennis L. Bress, 21/8 (Aug.), 25 "The Cashless, Checkless Society: On Its Way?," by Alan Wetterhuus, 21/11 (Nov.), 14 "Cashless-Society Project Reports Progress in N.Y.," 21/7 (July), 41 Catania, Salvatore C., "Computer System Models," 21/3 (Mar.), 14 Catastrophe, "The C&A Notebook on Common Sense, 'Common Sense vs. Catastrophe'," 21/12 (Dec.), 37 Central Intelligence Agency: "The Activities of" the Central Intelligence Agency, at Six Billion Dollars a Year," by Edward K. DeLong, 21/2 (Feb,), 38 "The CIA: A Visible Government in Indochina," by Fred Branfman and Steve Cohn, 21/ 2 (Feb.), 41 "The Central Intelligence Agency: A Short History to Mid-1963 -Part 1," by James Hepburn, 21/ 11 (Nov.), 32 "The Central Intelligence Agency: A Short History 1'0 Mid-1963 -Part 2," by James Hepburn, 21/ l2(Dec.),34 Cerullo, Michael J., "Satisfaction of Companies wi th Servi- 24 ces Received from EDP Service Bureaus," 21/1 (Jan.), 43 "Characteristics of Digital Computers," by GML Corp., 21/6B (Aug.), 92 Cheatham, Thomas E., Jr., "Chinese Computer Science: A Visit and a Report," 21/11 (Nov.), 16 "The Checkerboarding Problem," by Tactical Air Command, 21/1 (Jan.), 24 Checkless society, "The Cashless, Checkless Society: On Its Way?," by Alan Wetterhuus, 21/ 11 (Nov.), 14 Chess, "Winner of U.S. Chess Championship," 21/11 (Nov.), 43 "Chess and Computers," by Edmund C. Berkeley, 21/9 (Sept.), 6 "Chinese Computer Science More Advanced Than Expected," 21/10 (Oct.), 45 "Chinese Computer Science: A Visit and a Report," by Thomas E. Cheatham, Jr., 21/11 (Nov.), 16 Ciphers, "Computers, Ciphers, and Cryptography," by Oti s Minot, R. A. Sobieraj, and K. D. Streetman, 21/2 (Feb.), 47 Clay, William L., "Lead Poisoning: The Hypocrisy of the Presidency, and of the Appropriations Committee of the House of Representat i ves," 21/ 8 (Aug.), 7 Cleveland-Cliffs Iron Company, "Small Computer 'Tracks' Great Lakes Sailors," 21/9 (Sept.), 41 Coat, "Forty + One Ways To Cut a Coat," by Vectors' Staff, 21/ 3 (Mar.), 22 Cohn, Steve, and Fred Branfman, "The CIA: A Visible Government in Indochina," 21/2 (Feb.), 41 Colleges, "Roster of College and University Computer Facilities," 21/6B (Aug.), 149 "Color Matching by Computer Creates a New Bus iness," by J. Mark Raiteri, 21/1 (Jan.), 50 "Columbus Plus Two" (Computer Art), by Mike Seaters, 21/8 (Aug.), 15 "Combinatorial Framework of the Ordinal 15" (Computer Art), by Manfred Mohr, 21/8 (Aug.), 14 Commager, Henry Steele, "A Concerted Campaign To Deny the American People Essential Knowledge About the Operation of Their Government," 21/4 (Apr.), 33 Common Sense: "The C&A Notebook on Common Sense," 21/4 (Apr.), 2 "The C&A Notebook on Common Sense, Elementary and Advanced": 21/1 (Jan.), 2; 21/2 (Feb.), 3; 21/5 (May), 2 "The C&A Notebook on Common Sense, 'Common Sense vs. Catastrophe'," 21/12 (Dec.), 37 "The C&A Notebook on Common Sense, First Year": 21/8 (Aug.), 37; 21/9 (Sept.), 2; 21/11 (Nov.), 2; 21/12 (Dec.), 2 "c&A Notebook on Common Sense: 'How To Be Silly'," 21/12 (Dec.), 49 "The C&A Notebook on Common Sense: Second Year of Subscription, 1972," 21/12 (Dec.), 40 "The C&A Notebook on Common Sense, Volume I," 21/6 (June), 51 "Inventory of the Issues of the C&A Notebook on Common Sense, Volume I," 21/5 (May), 3 "The Old Brain, The New Brain, The Giant Brain, and Common Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6 "Questions and Answers about 'The C&A Notebook on Common Sense, Elementary and Advanced''': 21/1 (Jan.), 3; 21/7 (July), 9 "Common Sense, Wis dom, General Science, and Computers -- 11," by Edmund C. Berkeley, 21/1 (Jan.), 11 "Common Sense, Wisdom, and Information Processing: The Notebook on Common Sense, Elementary and Advanced," 21/7 (July), 6 Communications, "Computers and Communicat ions," by R. C. Scr i vener, 21/9 (Sept.), 10 Communi ty college, "The Compu ter and the Community College," by Raymond A. Pietak, 21/1 (Jan.), 9 "Computer Artists," 21/8 (Aug.), 19 Computer Census -- see "Monthly Computer Census" -- see "World Computer Census" "The Computer and the Communi ty College," by Raymond A. Pietak, 21/1 (Jan.), 9 Computer Directory and Buyers' Guide: "Annual Index for Volume 20, 1971 and Computer Directory and Buyers' Guide Issue, Vol. 19, No. 6B of 'Computers and Automation'," 21/1 (Jan.), 25 "Free Entries for Your Organization in the 1973 Computer Directory and Buyers' Guide Issue -- Notice," 21/6B (Aug.), 176 "'The Computer Directory and Buyers' Guide' Issue of "Computers and Automation', Notice": 21/5 (May), 40; 21/6 (June), 7 "The Computer Directory and Buyers' Guide Issue 1973 -Notice," 21/6B (Aug.), 178 "Computer Directory and Buyers' Guide, 1972": 21/7 (July), 50: 21/8 (Aug.), 39; 21/9 (Sept.), 39; 21/10 (Oct.), 34; 21/11 (Nov.), 40; 21/12 (Dec.), 51 "Computer Employed in Inner-City Heal th Program," 21/8 (Aug.), 43 "Computer Helps Analyze Worldwide Political Behavior," 21/7 (July), 40 "Computer Helps Develop Tomorrow's Telephone System," 21/9 (Sept.), 41 "Computer Helps Firm Produce Tiffany-Inspired Lampshades," 21/ 8 (Aug.), 42 "Computer Helps a Tree-Care Company Schedule and Plan," 21/6 (June), 44 "Computer Increasing Criminal Arrests by 10 Per Cent," 21/7 (July), 42 "The Compu ter and the I nte llec tual Frontier," by Dr. Richard W. Hamming, 21/6 (June), 25 "Computer Keeps 'Railroad' Running Smoothly," 21/3 (Mar.), 40 "A Computer Laboratory for Elementary Schools," by Dr. Seymour Papert, 21/6 (June), 19 "Computer Loaned to Massachusetts Prisoners," 21/5 (May), 43 Computer manufacturer, "How To Get the Best Out of a Computer Manufacturer," by David Futcher, 21/2 (Feb.), 8 "Computer Music in 1972," by Stuart Smith, 21/10 (Oct.), 16 "Computer Now Rides Up Front in Police Cruisers," by Chuck Gillam, 21/1 (Jan,), 50 "Computer Plays Key Role at Hillsborough Communi ty College," 21/8 (Aug.), 43 "Computer Science Is Added to College's Art Curriculum," 21/ 3 (Mar.), 40 "Computer System Models," by Sal vatore C. Catania, 21/3 (Mar.), 14 "Computer Tells Car Owners When Maintenance Is Needed," 21/10 (Oct.), 43 "Computer Thinking," by G. M. R. Graham, 21/3 (Mar.), 17 Computer-aided instruction, "CAl (Computer-Ai ded Ins truc t ion) Shortens Physician Learning Process," 21/12 (Dec.), 43 "Compu ter-As s is ted Analys i sand Documentation of Computer Programs," 21/10 (Oct,), 32 "Computer-Field Information vs. Social Rag," by Arthur Martin and Edmund C. Berkeley, 21/7 (July), 36 "Computerizing A Membership Association," by William R. Pollert, 21/4 (Apr.), 21 Computer-Link Corp., "Lessons Learned from Recent Floods of Computer Rooms," 21/11 (Nov.), 39 Computers and Automation, "Missing Issues of 'Computers and Automation'," from Stanley Jaffin, and Edmund C. Berkeley, 21/5 (May), 28 "Computers in Banking," by J. Q. Hollom, 21/8 (Aug.), 20 "Computers and Cartography," by Dennis L. Bress, 21/8 (Aug.), 25 "Computers, Ciphers, and Cryptography," by Otis Minot, R.A. Sobieraj, and K. D. Streetman, 21/2 (Feb.), 47 "Computers and Communications," by R. C. Scrivener, 21/9 (Sept.), 10 "Computers at Crisis," by Milton R. Wessel, 21/2 (Feb.), 10 "Computers and Dossiers -- Part 1," by Vern Countryman, 21/1 (Jan.), 13 "Computers and Dossiers -- Part II," by Vern Countryman, 21/2 (Feb.), 14 '''Computers Enter the Busing Controversy' -- Addendum," by Robert L. Glass, 21/4 (Apr.), Criminal cases, "District's Superior Court Uses Computer To Keep Track of 100,000 Criminal Cases," Joseph M. Burton, Clerk. 21/2 (Feb,), 52 Cryptography, "Computers, Ciphers, and Cryptography," by Otis Minot, R. A. Sobieraj, and K. D. Streetman, 21/2 (Feb.), 47 "Cryptology, The Computer, and Data Privacy," by M. B. Girsdansky, 21/4 (Apr.), 12 ",The Curse of a Magazine," by Edmund C. Berkeley, 21/2 (Feb.), 6 Cutler, Robert B., "Spotlight on McGeorge Bundy and the White House Situation Room, November 22, 1963," 21/1 (Jan.), 57 7 "Computers To Handle Problems on National Economy, Power Neto works and Ecology," 21/6 (June), "DEC's New School Computer Sys45 "Computers and Spelling," by tems," 21/12 (Dec.), 44 DPMA, "Business Programmer Exam Edmund C. Berkeley, 21/11 (Nov.), 6 Announcements and Study Guides "A Concerted Campaign To Deny Now Available," 21/9 (Sept.), the American People Essential 42 Knowledge About the Operation DTSS, Inc., "Dartmouth College of Their Government," by Henry Announces Formation of DTSS, Steele Commager, 21/4 (Apr.), Inc.," 21/12 (Dec.), 45 "Dallas: Who, How, Why? -- Part 33 Conference, "Fall Joint Computer 1," by Mikhail Sagatelyan, 21/ Conference: Topics," by Edmund 3 (Mar.), 28 C. Berkeley, 21/4 (Apr.), 33 "Dallas: Who, How, Why? Part Confidential data: "3400 OrganiII," by Mikhail Sagatelyan, zations Required by Court 21/4 (Apr.), 37 Order to Furni sh Confiden"Dallas: Who, How, Why? -tial Data to IBM," by Leon Part III," by Mikhail SagatelDavidson, John D. French, yan, 21/5 (May), 34 Norman R. Carpenter, and "Dallas: Who, How, Why? -- Part Philip Neville, 21/2 (Feb.), IV: Conclusion," by Mikhail 21 Sagatelyan, 21/6 (June), 34 "3400 Organizations Required D' Anna, Anthony J., "A Transby Court Order to Furnish portation Information System," Confidential Data to IBM -21/9 (Sept.), 14 II," by Richard E. Sprague, Dartmouth College, "Canadi an Norman R. Carpenter, and Colleges and High Schools are Business Week, 21/3 (Mar.), Members of Dartmouth's Time19 Sharing Computer Network," 21/ Conservation, "The Alaska Pipe7 (July), 43 line Reading Lesson," by Stew"Dartmouth College Announces Forart M. Brandborg, 21/6 (June), mation of DTSS, Inc.," 21/12 (Dec.), 45 30 Conspiracy, "The Assassination "Data Banks Endangering Personal of Senator Robert F. Kennedy: Liberty: Report of Debate in Proofs of Conspiracy and of Parliament, London, Engl and, Two Persons Firing," by RichApril 21, 1972," 21/6 (June), ard E. Sprague and William W. 40 Harper, 21/9 (Sept.), 24 "Data Center Services Offered Construction, "Datran Receives Smaller Stores Installing ElecInitial Construction Permits," tronic POS Equipment," 21/8 21/6 (June), 45 (Aug.),44 "The Construction of Living RoData system, "The Meaning of an bots -- Part 1," by Edmund C. Integrated Data System," by W. Berkeley, 21/8 (Aug.), 27 R. Larson, 21/4 (Apr.), 35 Consultant, "The Management Con"Datran Receives Initial Consul tant' s Role in Assessment struction Permits," 21/6 (June), of Data Processing Activities," 45 by James K. McKenna, Jr., 21/ Davey Tree Surgery Company, "Com10 (Oct.), 9 puter Helps a Tree-Care Company Contest -- see "Art Contes t" Schedule and Plan," 21/6 (June), -- sec "Martin Luther King 44 Memorial Prize Contest" Davidson, Leon, and John D, French, Contracts -- see "New Contracts" Norman R. Carpenter, Philip Correction, "CDC vs IBM -- CorNeville, "3400 Organizations rection," from Frederic O. ParRequired by Court Order to Furlova and Edmund C. Berkeley, nish Confidential Data to IBM," 21/4 (Apr.), 32 21/2 (Feb.), 21 "Corrections": 21/1 (Jan.), 47; Davis, Ruth M., "The U.S. Center 21/4 (Apr.), 32; 21/6 (June), for Computer Sciences and Tech49; 21/7 (July), 38 nology," 21/3 (Mar.), 7 "Correction and Retraction," by Dayhoff, Judy, "Whiskered Frisby" William W. Harper and Edmund (Computer Art), 21/8 (Aug.), 13 C. Berkeley, 21/12 (Dec.), 21 "Dealing with Today's Problems," Correctional institution, "New by John Skowronski, 21/4 (Apr.), Jersey Correctional Institut7 ion Pioneers Data Processing "The Death of the Democratic ParEducation for Inmates," by G. ty Candidate for the Presidency, Thompson Durand, 21/2 (Feb.), 1972," by Edmund C. Berkeley, 52 21/5 (May), 6 "Counting the Number of ApplicaDebate, "Data Banks Endangering tions of Computers," by Edmund Personal Liberty: Report of C. Berkeley, 2l/6B (Aug.), 3 Debate in Parliament, London, Countryman, Vern: "Computers and England, April 21, 1972," 21/6 Dossiers -- Part I," 21/1 (June),40 (Jan.), 13 '''Debugging System' for Computers "Computers and Dossiers -- Part Patented by Goodyear Tire & RubII," 21/2 (Feb.), 14 ber," 21/2 (Feb.), 53 Court, "District's Superior Court "Deciphering an Unknown Compu ter Uses Computer To Keep Track of Program, as Compared with De100,000 Criminal cases," Joseph ciphering of Ancient Writing," M. Burton, Clerk, 21/2 (Feb.), by Edmund C. Berkeley, 21/5 52 (May), 19 Crime: "Computer Increasing Crim- Decisions, "Essential Computer inal Arrests by 10 Per Cent," Concepts for Top Management: IV, 21/7 (July), 42 Workable, Sound, Data Processing "Do You Want To Stop Crime?," Decisions," by Robert A. Gagnon, by William p. Wood, III, 21/4 21/1 (Jan.), 8 (Apr.), 31 Dellums, Ronald V., Representative, "Operation Clean Sweep -- A "Wor 1 d Pe ace Tax Fund Ac t -City's War on Crime," by James Proposed Legislation," 21/10 P. Alexander, 21/2 (Feb.), 51 (Oct.), 36 Annual Index I, , DeLong, Edward K., "The Activities of the Central Intelligence Agency, at Six Billion Dollars a Year," 21/2 (Feb.), 38 Democratic party: "The Death of the Democratic Party Candidate for the Presidency, 1972," by Edmund C. Berkeley, 21/5 (May), 6 "Wal ter Sheridan -- Democrats' Investigator? or Republicans' Countermeasure?," by Richard E. Sprague, 21/11 (Nov.), 29 Democrat ic party headquarters: "Bernard L. Barker: Portrait of a Watergate BurgI ar," by Edmund C. Berkeley, 21/11 (Nov.), 26 "The June 1972 Raid on Democratic Party Headquarters," by Richard E. Sprague, 21/8 (Aug.), 33 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Inci dent) -Part 2," by Richard E. Sprague, 21/10 (Oct.), 18 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -Part 3," by Richard E. Sprague, 21/12 (Dec.), 24 "Dental School Explores ComputerAided Instruction," 21/7 (July), 43 Digital computers, "Charac teristics of Digi tal Computers," by G~L Corp., 21/6B (Aug.), 92 Digital Equipment Corp., "DEC's New School Computer Sys terns, " 21/12 (Dec.), 44 Director, corporate, "On the Legal Side: The Outside Director," by Milton R. Wessel, 21/4 (Apr.), 7 Directory and Buyers' Guide, "The Computer Directory and Buyers' Guide Issue 1973 -Notice," 21/6B (Aug.), 17B Discovery, "Statistics -- A Guide to the Unknown," by Edmund C. Berkeley, 21/10 (Oct.), 6 Discriminat ion, "The Mas ter Discriminatory Tool," by Douglas Wright, 21/9 (Sept.), 22 District of Columbia: "District's Superior Court Uses Computer To Keep Track of 100,000 Criminal Cases," Joseph M. Burton, Clerk, 21/ 2 (Feb.), 52 "Operation Clean Sweep -- A Ci ty' s War on Crime," by Jame s P. Alexander, 21/2 (Feb.), 51 "District's Superior Court Uses Computer To Keep Track of 100,000 Criminal Cases," Joseph M. Burton, Clerk, 21/2 (Feb.), 52 '" Do What I Mean': The Programmer's Assistant," by Warren Teitelman, 21/4 (Apr.), 8 "Do You Want To Stop Crime?," by William P. Wood, III, 21/4 (Apr.), 31 DoctorsAid, "Mini-Based System Takes Low Cost Patient Medical History," 21/12 (Dec.), 44 Documentation, "Computer-Ass isted ·Analysis and Documentation of Computer Programs," 21/10 (Oct.), 32 "Does Telephone Regulation Protect the User?," by Bernard Strassburg, 21/12 (Dec.), 11 Domestic discord, "The Promotion of Domestic Discord," by Vincent J. Salandria, 21/1 (Jan.), 37 "Don't Die, Ducky, Don't Die •.• ," by Bradley Yaeger & Associates, 21/8 (Aug.), 40 Doomsday, "Association for the Prevention of Doomsday -News and Ideas," 21/10 (Oct.), 36 "Doomsday -- Class A Hazards," from Edmund C. Berkeley, 21/ 11 (Nov.), 38 Dossiers: "Computers and Dossiers -- Part I," by Vern Countryman, 21/1 (Jan.), 13 "Computers and Dossiers -Part II," by Vern Countryman, 21/2 (Feb.), 14 Drew Health Center, "Computer Employed in Inner-City Health Program," 21/8 (Aug.), 43 Dreyer;· J. L." "Secrecy in the Data Process ing Industry," 21/8 (Aug.), 24 Ducky, "Don't Die, Ducky, Don't Die •.• ," by Bradley Yaeger & Associates, 21/8 (Aug.), 40 Dunker, Kenneth F., and Paul Shao: "Lak Gou" (Computer Art), 21/8 (Aug.), 16 "Nine Perspective Projections," (Computer Art), 21/8 (Aug.), 10 Durand, G. Thompson, "New Jersey Correctional Institution Pioneers Data Processing Education for Inmates," 21/2 (Feb.), 52 "The Dvorak Simplified Keyboard: Forty Years of Frustration," by Robert Parkinson, 21/11 (Nov.), 18 "EDP Axioms -- A Cri tical Analysis," by W. Leon Sanford, 21/ 5 (May), 12 EDP service bureaus, "Sati sfaction of Companies with Services Received from EDP Service Bureaus," by Michael J. Cerullo, 21/1 (Jan.), 43 Ecology: "Computers To Handle Problems on National Economy, Power Networks and Ecology," 21/6 (June), 45 "Don't Die, Ducky, Don't Die •.• ," by Bradley Yaeger & Associates, 21/8 (Aug.), 40 "Two Wisconsin Rivers Are Cleaner -- Officials Credit Computer," 21/9 (Sept.), 41 Economy, "Computers To Handle Problems on National Economy, Power Networks and Ecology," 21/6 (June), 45 EDITORIAL: "Achieving 'Personal' Response from a Computer," by Edmund C. Berkeley, 21/3 (Mar.), 6 "Chess and Computers," by Edmund C. Berkeley, 21/9 (Sept.), 6 "Computers and Spelling," by Edmund C. Berkeley, 21/11 (Nov.), 6 "Counting the Number of Applications of Computers," by Edmund C. Berkeley, 21/6B (Aug.), 3 "The Curse of a Magazine," by Edmund C. Berkeley, 21/2 (Feb.), 6 "The Death of the Democratic Party Candidate for the Presidency, 1972," by Edmund C. Berkeley, 21/5 (May), 6 "The House Is on Fire," by Edmund C. Berkeley: 21/2 (Feb.), 37; 21/8 (Aug.), 38 "Hurray for the Univac Division of Sperry Rand," by Edmund C. Berkeley, 21/1 (Jan.), 6 "The Old Brain, The New Brain, The Giant Brain, and Common Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6 "Post-Maturity in the Computer Field," by Edmund C. Berkeley and Montgomery Phister, Jr .. 21/12 (Dec.), 6 "The Pur sui t of Truth in Input, Output, and Processing," by Edmund C. Berkeley, 21/8 (Aug.), 6 "The Shooting of Governor George C. Wallace, Candidate for President," by Edmund C. Berkeley, 21/7 (July), 10 "The Shortage of Good Typists -- and the JJ Command," by Edmund C, 8erkeley, 21/6 (June),6 "Statistics -- A Guide to the Unknown," by Edmund C. Berkeley, 21/10 (Oct.), 6 Education: "A Computer Laboratory for Elementary Schools," by Dr. Seymour Papert, 21/6 (June),19 "Health and Education of Migrant Workers Is Being Watched by a Computer," 21/6 (June), 44 "Helping Out," 21/7 (July), 42 "New Jersey Correctional Insti tution Pioneers Data Process ing Education for Inmates," by G, Thompson Durand, 21/2 (Feb.), 52 "Education for Data Processing: Yesterday, Today, Tomorrow," by Thomas R, Tirney, 21/7 (July), 14 "Educational Television Transmission System Connects Universities and Industries," by J. P. Shanks, 21/1 (Jan.), 49 "Effective Management of an Instrument Pool," by D. R. Townsend, 21/5 (May), 8 Egan, M., and Edmund C. Berkeley, "Publishing Articles on Issues that Don't Get the Attention They Deserve," 21/10 (Oct.), 38 "Eight Hundred People Interested in Mechanical Brains," by Edmund C. Berkeley, 21/1 (Jan.), 7 "Eight Photographs of a Bush: Pictorial Reasoning Tests -Part 7," by Neil Macdonald, 21/10 (Oct.), 27 Elemen tary schools, "A Computer Laboratory for Elementary Schools," by Dr. Seymour Papert, 21/6 (June), 19 Elias, Dr. Samy E. G., and R. E. Ward, Michael Wilson, "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part II: The Computer as the Heart of Personal Rapid Transit," 21/6 (June), 13 "Emission-I" (Computer Art), by Sozo Hashimoto, 21/8 (Aug.), 13 "Encouragemen t for the Pursuit of Truth," from Mrs. Ruth Shapin, Mrs. Lucy Bell, William H. Wynne, Rainer M. Goes, and Thomas D. Bryant, 21/11 (Nov.), 38 England, "Computers in Banking," by J. Q. Hallam, 21/8 (Aug.), 20 "English College's Timesharing System Has 3000 Users," 21/11 (Nov.), 42 Environment, "Air-Pollution Game To Deal with Environmental Problems," by Prof. Mat thew J. Reilly, 21/1 (Jan.), 50 Environmental health, "Ohio State Uni vers i ty Probing Effect of Environmental Changes on Ilody," 21/10 (Oct.), 44 "Essenti al Computer Concepts for Top Management: IV, Workable, Sound, Data Processing Decisions," by Robert A. Gagnon, 21/1 (Jan.), 8 Fabric cutting, "Forty + One Ways To Cut a Coat," by Vectors' Staff, 21/3 (Mar.), 22 Fa'C't'S, "Some Hard Facts, and What To Do About Them," by Edmund C. Berkeley, 21/10 (Oct.), 3 "Faculty Loans to Black Colleges," by E. Nanas, 21/2 (Feb.), 52 "Fall Joint Computer Conference: Topics," by Edmund C. Berkeley, 21/4 (Apr.), 33 Farewell America: "The Central , Intelligence Agency: A Short History to Mid-1963 -- Part 1," by James Hepburn, 21/11 (Nov.), 32 "The Central Intelligence Agency: A Short Hi s tory to Mid-1963 -- Part 2," by James Hepburn, 21/12 (Dec.), 34 Film reader, "Japanese Firm Buys Programmable Film Reader," 21/8 (Aug.), 45 Fire, "The House Is on Fire," by Edmund C. Berkeley: 21/2 (Feb.), 37; 21/8 (Aug.), 38 Floods, "Lessons Learned from Recent Floods of Computer Rooms," Computer-Link Corp., 21/11 (Nov.), 39 "Flores En Fortranes," (Computer Art), by Thomas J. Huston, 21/ 8 (Aug.), 18 Florida, "Poinciana, New Florida City, Being Planned with Aid of Computer," McDonnell Douglas Automation Co., 21/2 (Feb.), 51 "Forty + One Ways To Cut a Coat," by Vectors' Staff, 21/3 (Mar.), 22 "Free Computer Training Center Coming to Harlem, NY," 21/5 (May), 42 "Free Entries for Your Organization in the 1973 Computer Directory and Buyers' Guide Issue -- Notice," 21/6B (Aug.), 176 French, John D., and Leon Davidson, Norman R. Carpenter, Philip Neville, "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM," 21/2 (Feb.), 21 "French National Railway Implements Addi tional Computerization To Enhance Profitabili ty," 21/9 (Sept.), 40 The Frenchman Who Was To Kill Kennedy, "Le Francais Qui Devai t Tuer Kennedy (The Frenchman Who Was To Kill Kennedy)," by Philippe Bernert and Camille Gilles, 21/12 (Dec.), 38 Fuj itsu, Ltd., "Japanese Firm Buys Programmable Film Reader," 21/8 (Aug.), 45 Fulbright, J. William, and Richard M. Nixon, and others, "Poli tical Lies: An Acceptable Level?," 21/4 (Apr.), 44 Futcher, David, "How To Get the Best Out of a Computer Manufacturer," 21/2 (Feb.), 8 G G.E. computer, "Swedish Steel Producer Linked to G.E. Computer in Cleveland," 21/11 (Nov.), 41 G~L Corp., "Characteristics of Digi tal Computers," 21/6B (Aug.), 92 Gagnon, Robert A., "Essential Computer Concepts for Top Management: IV, Workable, Sound, Data Processing Decisions," 21/1 (Jan.), 8 Games: "ZINGO -- A New Computer Game," by Edmund C. Berkeley, 21/2 (Feb.), 32 "ZINGO -- A New Game for Computers and/or People": 21/3 (Mar.), 2; 21/11 (Nov.), 3 Gearing, Harold W.' G., and others, "The Bad Image That Computers Are Earning," 21/4 (Apr.), 29 General science, "Common Sense, Wisdom, General Science, and Compu ter s -- II," by Edmund C. Berkeley, 21/1 (Jan.), 11 "Geographic Roster of Organizations in Computers and Oat a Processing," 21/6B (Aug.), 51 "Georgia Inaugurates Statewide Computerized Training Program in Vocational Technical Schools," 21/8 (Aug.), 44 "Georgia To Release Cash Flow Sys tern To State and Local Governments at No Cost," 21/9 (Sept.), 42 Gerberick, Dahl A., "Oversupply of People in the Computer Field," 21/12 (Dec.), 23 Gerstenhaber, Murray, "Undergraduate Mathematics Training in 1984 -- Some Predictions," 21/11 (Nov.), 11 Gillam, Chuck, "Computer Now Rides Up Front in Police Cruisers," 21/1 (Jan.), 50 Gilles, Camille, and Philippe Bernert, "Le Francais Qui Devai t Tuer Kennedy (The Frenchman Who Was To Kill Kennedy)," 21/12 (Dec.), 38 Girsdansky, M. B., "Cryptology, The Computer, and Oats Privacy," 21/4 (Apr.), 12 Glaciers, "Scientists Obtain First Three-Dimens ional Look at Glaciers with Help of Computer," 21/3 (Mar.), 39 Gl ass fiber, "Video telephony Via Glass Fiber," 21/11 (Nov.), 42 Glass, Robert L., '''Computers Enter the Busing Controversy' -- Addendum," 21/4 (Apr.), 7 Goes, Rainer M., and Mrs. Ruth Shapin, Mrs. Lucy Bell, William H. Wynne, Thomas D. Bryant, "Encouragement for the Pursuit of Truth," 21/11 (Nov,), 38 Goodrich, B. F., "Marriage of Computers Meets Special Data Processing Needs of B. F. Goodrich," by Arthur Wi 11 iams. 21/1 (Jan.), 49 Goodyear Tire & Rubber, '''Debugging System' for Computers Patented by Goodyear Tire & Rubber," 21/2 (Feb.), 53 Government: "The CIA: A Visible Government in Indochina," by Fred Branfman and Steve Cohn, 21/2 (Feb.), 41 "A Concerted Campaign To Deny the American People Essential Knowledge About the Operation of Their Government," by Henry Steele Commager, 21/4 (Apr.), 33 "Georgia To Release Cash Flow System to State and Local Governments at No Cost," 21/9 (Sept.), 42 "The Information Industry and Government Pol icy," by Cl ay T. Whitehead, 21/4 (Apr.), 24 "North Vietnam and American Bombing: Six American Government Lies," by Bill Zimmerman, 21/9 (Sept,), 33 "The Present Role of Governments in the World Computer Industry," by C, W. Spangle, 21/12 (Dec.), 16 Graham, G. M. R., "Computer Thinking," 21/3 (Mar.), 17 "Gravi ty Effects Studied Under Compu ter-Controlled Experiments," 21/7 (July), 40 Gray, Stephen Barrat, "Building Your Own Computer -- Part II," 21/1 (Jan.), 20 Great Lakes, "Small Computer 'Tracks' Great Lakes Sailors," 21/9 (Sept.), 41 Grimshaw, William F., "Pontiac Dealers Use Computer To Track Car Production for Consumers," 21/2 (Feb.), 51 Gun numbers, "Marlin Computerized System for Checking and Recording Gun Numbers," 21/8 (Aug.), 42 H Hamming, Dr. Richard W., "The Computer and the Intellectual Frontier," 21/6 (June), 25 "Harbor Surveillance System Foresees Collisions, Surface Traffic Problems," 21/3 (Mar.), 41 Harlem, NY, "Free Computer Training Center Coming to Harlem, NY," 21/5 (May), 42 Harper, William W., and Edmund C. Berkeley, "Correction and Retraction," 21/12 (Dec.), 21 Harper, William W., and Richard E. Sprague, "The Assassination of Senator Robert F. Kennedy: Proofs of Conspiracy and of Two Persons Firing," 21/9 (Sept.), 24 Harrison, S. R., "Some Responsibility for Our Chaotic Society," 21/4 (Apr.), 34 Harvard Uni v., "Chine se Computer Science More Advanced Than Expected," 21/10 (Oct.), 45 Hashimoto, Sozo, "Emiss ion-I" (Computer Art), 21/8 (Aug.), 13 Hatfield Polytechnic, "English College's Timesharing System Has 3000 Users," 21/11 (Nov.), 42 Heal th, "Computer Employed in Inner-City Heal th Program," 21/ 8(Aug.),43 "Health and Education of Migrant Workers Is Being Watched by a Computer," 21/6 (June), 44 "Helping Out," 21/7 (July), 42 Hepburn, James: "The Central Intelligence Agency: A Short History to Mid-1963 -- Part 1," 21/1 (Nov.), 32 "The Central Intelligence Agency: A Short History to Mid1963 -- Part 2," 21/12 (Dec.), 34 "The High Cost of Vendor's Software Practices: Why?," by Raymond E. Bache, 21/12 (Dec.), 20 Hillsborough Community College, "Computer Plays Key Role at Hillsborough Communi ty College," 21/8 (Aug.), 43 Hollom, J. Q., "Computers in Banking," 21/8 (Aug,), 20 I1oneywell, Inc., "Computer Loaned to Massachusetts Prisoners," 21/5 (May), 43 "Horizons and Rebellion," by Edmund C. Berkeley, 21/9 (Sept.), 36 "The House Is on Fire," by Edmund C. Berkeley: 21/2 (Feb.), 37; 21/8 (Aug.), 38 House of Representatives, "Lead Poisoning: The Hypocrisy of the Presidency, and of the Appropriations Committee of the House of Representatives," by William L. Clay, 21/8 (Aug.), 7 "How Fiendish Can You Get?," by Helsingen Sanomat, Ian Low, Judy Bellin, Bella Abzug, and Edmund C. Berkeley, 21/5 (May), 31 "How Technolouy Is Freeing the Secretory," by Evelyn Berezin, 21/10 (uct.), 15 25 Annual Index "How To Get the Best Out of a Computer Manufacturer," by David Futcher, 21/2 (Feb.), 8 Howells, W. W., "The Importance of Being Human," 21/10 (Oct.), 12 Human, "The Importance of Being Human," by W. W. Howells, 21/ 10 (Oct.), 12 !lumbert, Dr. !lerbert E., "Academic Computer Practices, and Their Deficiencies," 21/5 (May), 16 "Hurray for the Univac Division of Sperry Rand," by Edmund C. Berkeley, 21/1 (Jan.), 6 Huston, Thomas J.: "Flores En Fortranes," (Computer Art), 21/8 (Aug.), 18 "Sky Lab SVB" (Computer Art), 21/8 (Aug.), 12 Braillemboss Being Used by Blind IRS Representative," 21/ 9 (Sept.), 43 "Internal Revenue Service: Use of Computers," by William II. Stewart, Jr., 21/4 (Apr.), 34 "Inventory of the Issues of the (LA Notebook on Common Sense, Volume 1," 21/5 (May), 3 "Invisible Phonograph Needle in Development by Navy," 21/9 (Sept.), 43 Issues, controversial, "Publishing Articles on Issues that Don't Get the Attention They Deserve," from M. Egan and Edmund C. Berkeley, 21/10 (Oct.), 38 Italy, "Persuasion -- Ital ian Style," by Peter Tumi ati, 21/6 (June),41 IBM: JJ command: "On the JJ Command," from Tore Rambol and Edmund C. Berkeley, 21/10 (Oct.), 37 "The Shortage of Good Typists -- and the JJ Command," by Edmund C. Berkeley, 21/6 (June),6 Jaffin, Stanley, and Edmund C. Berkeley, "Missing Issues of 'Compuers and Automation', tI 21/5 (May), 28 .. Japanese Firm Buys Programmable Film Reader," 21/8 (Aug.), 45 Jenkins, Gareth, "Who Shot President Kennedy -- or Fac t and Fable in History," 21/2 (Feb.), 43 Job requirement s, .. Industr i al Robot Will Automatically Select and Match Actions to Changing Job Requirements," by Michael M. Meyers, 21/1 (Jan.), SO Jobs, "Oversupply of People in the Computer Field," by Dahl A. Gerberick, 21/12 (Dec.), 23 John Hopkins Uni v., "Harbor Surveillance System Foresees Collisions, Surface Traffic Problems," 21/3 (Mar.), 41 Johnson, Jim, and Edmund C. Berkeley, "Subscription Errors: (LA Will Correct," 21/11 (Nov.), 39 Johnson, Lyndon B., "Dallas: Who, How, Why? Part II," 21/4 (Apr.), 37 "The June 1972 Raid on Democratic Party Headquarters," by Richard E. Sprague, 21/8 (Aug.), 33 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -- Part 2," by Richard E. Sprague, 21/10 (Oct.), 18 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -- Part 3," by Richard E. Sprague, 21/12 (Dec.),24 "Justice Department Interested in ADAPSO Hearings," 21/3 (Mar.), 41 "CDC vs IBM -- Correction," from Frederic O. Parlova and Edmund C. Berkeley, 21/ 4 (Apr.), 32 "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM," by Leon Davidson, John D. French, Norman R. Carpenter, and Philip Neville, 21/2 (Feb.), 21 "3400 Organizations Required by Court Order to Furni sh Confidential Data to IBM II," by Richard E. Sprague, Norman R. Carpenter, and Business Week, 21/3 (Mar.), 19 "IBM's Powerful Partner: The Accounting Principles Board," from Samson Science Corp., 21/4 (Apr.), 31 Ihrcr, Fred C., "Benchmarking vs. Simulation," 21/11 (Nov.), 8 Image, "The Bad Image That Computers Are Earning," from Harold W. G. Gearing and others, 21/4 (Apr.), 29 "Image Analysis -- Even for Abraham Lincoln," 21/3 (Mar.), 39 "The Impact of the Compu ter on Society -- Some Comments," by Joseph Weizenbaum, 21/7 (July), 18 "The Importance of Being Human," by W. W. Howells, 21/10 (Oct.), 12 Index, "Annual Index for Volume 20, 1971 and Computer Directory and Buyers' Guide Issue. Vol. 19, No. 6B of 'Computers and Automation' ," 21/1 (Jan.), 25 Indochina, "The CIA: A Visible Government in Indochina," by Fred Branfman and Steve Cohn, 21/2 (Feb.), 41 "Industrial Robot Will Automatically Select and Match Actions to Changing Job Requirements," by Michael M. Meyers, 21/1 (Jan.), 50 Informatics, Inc., "Toxicology Research Data Available Via On-line Nationwide Network," 21/6 (June), 44 Information engineer, "The Neglect of Significant Subjects, and the Information Engineer," by Peter J. Nyikos and Edmund C. Berkeley, 21/7 (July), 30 "The Information Industry and Government Policy," by Clay T. Whitehead, 21/4 (Apr.), 24 Information Interchange, "Ameri. can Standard Code for Information Interchange, ASCII," 21/ 6B (Aug.), 180 Installations -- see "New Installations" Instant Transaction, "CashlessSociety Project Reports Progress in N. Y.... 21/7 (July), 41 Insti tutions, "Reducing and Dismantling Science and Research Institutions, and Social Responsibility," by Andrew G. Michalitsanos, 21/4 (Apr.), 32 Instrument pool, "Effecti ve Management of an Instrument Pool." by D. R. Townsend, 21/5 (May). 8 Intellectual Frontier, "The Con,puter and the Intellectual Frontier," by Dr. Hichard W. Hamming, 21/6 (June), 25 Internal Revenue Service, "M. 1. T.- 26 K Kaler, John, and Edmund C. Berkeley, "Unhappy Subscriber to Satisfied One," 21/7 (July), 38 Kennedy, John F., President: "Dallas: Who, How, Why? Part II," by Mikhail Sagatelyna, 21/4 (Apr.), 37 "Le Francais Qui Devai t Tuer Kennedy (The Frenchman Who Was To Ki 11 Kennedy)," by Philippe Bernert and Camill .. Gilles, 21/12 (Dec.), 38 "Who Shot President Kennedy or Fact and Fable in History," by Gareth Jenkins, 21/2 (Feb.),43 Kennedy, Senator Robert F., "The Assassination of Senator Robert F. Kennedy: Proofs of Conspiracy and of Two Persons Firing," by Richard E. Sprague and William W. Harper, 21/9 (Sept.), 24 Kentucky, Univ. of: "Architecture Students Turning to Computer To Improve Design, Creativity," 21/5 (May), 42 "Dental School Explores Computer-Aided Instruction," 21/ 7 (July), 43 "Gravi ty Effects Studied Under Computer-Controlled Experiments," 21/7 (July), 40 Keyboard, "The Dvoark Simplified Keyboard: Forty Years of Frustration," by Robert Parkinson, 21/11 (Nov.), 18 King, Martin Luther, "Martin Luther King Memorial Prize Contest -- Fourth Year," 21/2 (Feb.), 34 Knowledge, "The Mos t Important of All Branches of Knowledge," by Edmund C. Berkeley: 21/1 (Jan.), 36; 21/2 (Feb.), 2; 21/6 (June), 50; 21/7 (July), 7 Kunstler, William M., "Only People Massed Together Can Alter Systems," 21/9 (Sept.), 28 Kyle, D. F., "Sperry Rand and RCA Sign Final Agreement," 21/2 (Feb.), 53 "Lak Gou" (Computer Art), by Kenneth F. Dunker and Paul Shao, 21/8 (Aug.), 16 Lamps, "Tiny Lamps that Glow for 100 Years," Western Electric Company, Inc., 21/2 (Feb.), 53 Lampshades, "Computer Helps Firm Produce Tiffany-Inspired Lampshades," 21/8 (Aug.), 42 Landgrebe, Dr. David, "Aerial Photography and Computers Aid the Battle Against Blight and Pollution," 21/1 (Jan.), 48 Languages, programming, "Ros ter of Programming Languages 1972," by Jean E. Sammet, 21/6B (Aug.), 123 Larson, W. R., "The Meaning of an Integrated Data System," 21/4 (Apr.), 35 Law, "Mississippi's Computerized Statute System," 21/10 (Oct.), 43 "Le Francais Cui Devait Tua Kennedy (The Frenchman Who Was To Kill Kennedy)," by Philippe Bernert and Camille Gilles, 21/ 12 (Dec.), 38 "Lead Poisoning: The Hypocrisy of the Presidency, and of the Appropriations Commi ttee of the House of Representatives," by William L. Clay, 21/8 (Aug.), 7 Legal: "On the Legal Side: A Lien on Computer Tapes?," by Milton R. Wessel, 21/6 (June), 39 "On the Legal Side: The Outside Director," by Mil ton R. Wessel, 21/4 (Apr.), 7 "Lessons Learned from Recent Floods of Computer Rooms," Computer-Link Corp .. 21/11 (Nov.), 39 Liberty, personal, "Data Banks Endangering Personal Liberty: Report of Debate in Parliament, London, England, April 21, 1972," 21/6 (June), 40 Lies: "North Vietnam and American Bombing: Six American Governmen t Lie s," by Bi 11 Zimmerman, 21/9 (Sept.), 33 "Political Lies: An Acceptable Level?," by Richard M. Nixon, J. William Fulbright, and others, 21/4 (Apr.), 44 "The Reality Behind the Lies in South Vietnam," by Dr. George Wald, 21/12 (Dec.), 31 Lincoln, Abraham, "Image Analysis -- Even for Abraham Lincoln," 21/3 (Mar.), 39 Lipp, Michael, "Ode in Celebration of RFPs," 21/5 (May), 29 Lipscomb, James, "Adversity" (Computer Art), 21/8 (Aug.), 9 Litton UHS, "New High-Density Warehousing System Announced by Litton OIlS," 21/9 (Sept.), 42 Lovett, Linda Ladd, "Over 2300 Applications of Computers and Data Processing," 21/6B (Aug.). 137 Low, Ian, and Helsingen Sanomat, Judy Bellin, Bella Abzug, Edmund C. Berkeley, "How FiendiSh Can You Get?," 21/5 (May), 31 M "M.I.T.-Braillemboss Being Used by Blind IRS Representative," 21/9 (Sept.), 43 Macdonald, Neil: -- see "Advanced Numbles" -- see "Monthly Computer Census": 21/1 (Jan.), 54; 21/2 (Feb.), 56; 21/3 (Mar.), 46; 21/4 (Apr.), 48; 21/5 (May), 46; 21/6 (June), 48; 21/7 (July), 46; 21/8 (Aug.), 48; 21/9 (Sept.), 46; 21/10 (Oct.), 48; 21/11 (Nov.), 47; 21/12 (Dec.), 48 -- see "Numbles" "Eight Photographs of a Bush: Pictorial Reasoning Tests -Part 7," 21/10 (Oct.), 27 "Pictorial Reasoning Tests -Analysis and Answers," 21/3 (Mar.), 24 "Pictorial Reasoning Tests and Aptitudes of People -- III," 21/2 (Feb.), 29 "Pictorial Reasoning Tests -Part 5," 21/4 (Apr.), 26 "Pictorial Reasoning Tests -Part 6," 21/7 (July), 26 "World Computer Census," 21/6B (Aug.), 133 Machet, Michael, Associates, "Computer Helps Firm Produce Tiffany-Inspired Lampshades," 21/8 (Aug.), 42 Magazine, "The Curse of a Magazine," by Edmund C. Berkeley, 21/2 (Feb.), 6 Management, "Essential Computer Concepts for Top Management: IV, Workable, Sound, Data Processing Decisions," by Robert A. Gagnon, 21/1 (Jan.), 8 "The Management Consultant's Role in Assessment of Data Processing Activities," by James K. McKenna, Jr., 21/10 (Oct.), 9 "Management Information Systems: The Trouble With Them," by Colonel T. B. Mancinelli, 21/ 7 (July), 11 Mancinelli, Colonel T. B., "Management Information Systems: The Trouble With Them," 21/7 (July), 11 Maps, "Three Dimensional Maps from Computer," 21/12 (Dec.), 42 Mariner, "Real-Time Pictures of Mars by Mariner and by Computer," by Wayne E. Shufelt, 21/ 6 (June'), 7 Market information system, "Bunker-Ramo Activates New Nationwide Market Data Sys tern," 21/10 (Oct.), 45 "Marlin Computerized System for Checking and Recording Gun Numbers," 21/8 (Aug.), 42 Marlin Firearms Company, "Marlin Computerized System for Checking and Recording Gun Numbers," 21/8 (Aug.), 42 "Marriage of Computers Meets Special Data Processing Needs of B.F. Goodrich," by Arthur Williams, 21/1 (Jan.), 49 Mars, "Real-Time Pictures of Mars by Mariner and by Computer," by Wayne E. Shufelt, 21/6 (June),7 Martin, Arthur, and Edmund C. Berkeley, "Computer-Field Information vs. Social Rag," 21/7 (July), 36 "Martin Luther King Memorial Prize Contest -- Fourth Year," 21/2 (Feb.), 34 "The Master Discriminatory Tool," by Douglas Wright, 21/9 (Sept.), 22 Mathematics, "Undergraduate Mathematics Training in 1984 -- Some Predictions," by Dr. Murray Gerstenhaber, 21/11 (Nov.), 11 Maturity, "Post-Maturity in the Computer Field." by Edmund C. Berkeley, and Montgomery Phister, Jr., 21/12 (Dec.), 6 McDonnell Douglas Automation Co., "Poinciana, New Florida City, Being Planned with Aid of Computer," 21/2 (Feb.), 51 McKenna, James K., Jr., liThe Management Consultant's Role in Assessment of Data Processing Activities," 21/10 (Oct.), 9 "The Meaning of an Integrated Data System," by W. R. Larson, 21/4 (Apr.), 35 Mechanical brains, "Eight Hundred People Interested in Mechanical Brains," by Edmund C. Berkeley, 21/1 (Jan.), 7 Medical history, "Mini-Based System Takes Low Cost Patient Medical History," 21/12 (Dec.), 44 Medicine, Ohio State Univ. College of, "Uni versi ty Computer Helps Doctors with 'Bedside Teaching' ," 21/11 (Nov.), 42 Membership, "Computerizing A Membership Association," by William R. Pollert, 21/4 (Apr.), 21 "Meri t Computer Network Links Michigan's Largest Universities," 21/3 (Mar.), 40 Metropolis, New Mexico, "Mythical City Helps Students Learn Municipal Affairs," 21/12 (Dec.),43 Meyers, Michael M., "Industrial Robot Will Automatically Select and Match Actions to Changing Job Requirements," 21/1 (Jan.), 50 Michalitsanos, Andrew G., "Reducing and Dismantling Science and Research Insti tutions, and Social Responsibility," 21/4 (Apr.), 32 Michigan State Univ.: "Merit Computer Network Links Michigan's Largest Universities," 21/3 (Mar.), 40 "Three Dimens ional Maps from Computer," 21/12 (Dec.), 42 Migrant workers, "Heal th and Education of Migrant Workers Is Being Watched by a Computer," 21/6 (June), 44 "Mini-Based System Takes Low Cost Patient Medical History," 21/12 (Dec.), 44 Minori ty group, "Schol arship Program for Minority Group Students," 21/12 (Dec.), 44 Minot, Otis, and R. A. Sobieraj, K. D. Streetman, "Computers, Ciphers, and Cryptography," 21/2 (Feb.), 47 "Missing Issues of 'Computers and Automation'," from Stanley Jaffin, and Edmund C. Berkeley, 21/5 (May), 28 "Mississippi's Computerized Statute System," 21/10 (Oct.), 43 Missouri-Columbia, Univ. of, "Image Analysis -- Even for Abraham Lincoln," 21/3 (Mar.), 39 Mistakes, "Prevent Mistakes Before They Happen?": 21/7 (July), 8; 21/9 (Sept.), 3; 21/10 (Oct.), 2 Mohr, Manfred, "Combinatorial Framework of the Ordinal 15" (Computer Art), 21/8 (Aug.), 14 "Moment of Truth in Vietnam?," from Charles A. Wells, 21/10 (Oct.), 39 Monkeys, "Gravity Effects Studied Under Computer, Controlled Experiments," 21/7 (July), 40 M.lNTHLY COMPUTER CENSUS: 21/1 (Jan.), 54; 21/2 (Feb.), 56; 21/3 (Mar.), 46; 21/4 (Apr.), 48; 21/5 (May), 46; 21/6 (June), 48; 21/7 (July), 46; 21/8 (Aug.), 48; 21/9 (Sept.), 46; 21/10 (Oct.), 48; 21/11 (Nov.), 47; 21/12 (Dec.), 48 Morgantown, West Virginia: "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part I: The Plan," by William W. Aston, 21/6 (June), 11 "Personal Rapid Transit, Com- puterized, in Morgantown, West Virginia, Part II: The Compu ter as the Heart of Personal Rapid Transit," by Dr. Samy E. G. Elias, R. E. Ward, and Michael Wilson, 21/6 (June), 13 "The Most Important of All Branches of Knowledge," by Edmund C. Berkeley: 21/1 (Jan.), 36; 21/2 (Feb.), 2; 21/6 (June), 50; 21/7 (July), 7 "Movement of South Dakota Pheasants Tracked by Computer," by Dr. Donald Progulske, 21/1 (Jan.), 48 Multiplication, "SHARE and the Mul tiply Carry Bug," by Herb Bright, 21/2 (Feb.), 50 llunicipal Affairs, "Mythical City Helps Students Learn Municipal Affairs," 21/12 (Dec.), 43 llusic, "Computer Music in 1972," by Stuart Smith, 21/10 (Oct.), 16 "Mythical City Helps Students Learn MuniCipal Affairs," 21/ 12 (Uec.), 43 j t Annual Index o N Name selection, "On the Legal Side: Company Name Selection" by Milton R. Wessel, 21/5 (May), 29 Nanas, E., "Faculty Loans to Black Colleges," 21/2 (Feb.), 52 National Association of Manufacturers, "Computerizing A Membership Association," by William R. Pollert, 21/4 (Apr.), 21 National Cash Register Co., "Data Center Services Offered Smaller Stores Installing Electronic POS Equipment," 21/8 (Aug.), 44 Navigational satell ite, "Navy and Commercial Users Share Navigational Satellite," 21/ 12 (Dec.), 45 Navy, "Invisible Phonograph Needle in Development by Navy," 21/9 (Sept.), 43 "Navy and Commercial Users Share Navigational Satellite." 21/12 (Dec.), 45 "The Neglect of Significant Subjects, and the Information Engineer," by Peter J. Nyikos and Edmund C. Berkeley, 21/7 (July),30 Neville, Philip, and Leon Davidson, John D. French, Norman R. Carpenter, "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM," 21/2 (Feb.), 21 "New Algebra Option Promises Breakthrough in Calculator Programming,." 21/8 (Aug.), 44 "New Computers for United Air Lines," 21/9 (Sept.), 42 NEW CONTRACTS: 21/1 (Jan.), 52; 21/2 (Feb.), 54; 21/3 (Mar.), 42; 21/4 (Apr.), 46; 21/5 (May), 44; 21/6 (June), 46; 21/7 (July), 44; 21/8 (Aug.), 46; 21/9 (Sept.), 44; 21/10 (Oct.), 46; 21/11 (Nov.), 44; 21/12 (Dec.), 46 "New High-Density Warehousing Sys tem Announced by Litton UHS," 21/9 (Sept.), 42 NEW INSTALLATIONS: 21/1 (Jan.), 53; 21/2 (Feb.), 55; 21/3 (Mar.), 43; 21/4 (Apr.), 47; 21/5 (May), 45; 21/6 (June), 47; 21/7 (July), 45; 21/8 (Aug.), 47; 21/9 (Sept.), 45; 21/10 (Oct.), 47; 21/11 (Nov.), 45; 21/12 (Dec.), 47 "New Jersey Correctional Institution Pioneers Data Processing Education for Inmates," by G. Thompson Durand, 21/2 (Feb.), 52 New Mexico, Uni v. of, "Computer Science Is Added to College's Art Curriculum," 21/3 (,lar.), 40 "Nine Perspective Projections, (Computer Art), by Kenneth F. Dunker and Paul Shao, 21/8 (Aug.), 10 1984, "Undergraduate Mathematics Training in 1984 -- Some Predictions," by Dr. Murray Gerstenhaber, 21/11 (Nov.), 11 Nixon, Richard M., and J. William Fulbright, and others, "Poli tical Lies: An Acceptable Level?," 21/4 (Apr.), 44 "North Vietnam and American Bombing: Six American Government Lies," by Bill Zimmerman, 21/9 (Sept.), 33 II Notre Dame, Univ~ of, "Computer To Handle Problems on National Economy, Power Networks and Ecology," 21/6 (June), 45 "No.4 ESS Will Triple Toll Call Capacity," 21/0 (Aug.), 45 Numbles -- see "Advanced Numbles" NUMBLES: by Neil Macdonald: 1t721 , 21/1 (Jan.), 45; 1t722 , 21/2 (Feb.), 29; 11'723, 21/3 (Mar.), 45; 1t724, 21/4 (Apr.), 36; 1t725, 21/5 (May), 49; 1t726, 21/6 (June), 23; 11'727, 21/7 (July), 26; 1t728 , 21/8 (Aug.), 50; 1t729, 21/9 (Sept.), 13; lt72lO, 21/10 (Oct.), 50; 1t7211, 21/11 (Nov.), 28; 21/ 12 (!Jec.) , 30 Nyikos, Peter J., and Edmund C. Berkeley, "The Neglect of Significant Subjects, and the Information Engineer," 21/7 (July), 30 ~'Ode in Celebration of RFPs," by Michael Lipp, 21/5 (May), 29 Ohio State Univ. College of Medicine, "University Computer Helps Doctors with 'Bedside Teaching'," 21/11 (Nov.), 42 "Ohio State University Probing Effect of Environmental Changes On Body," 21/10 Wc t. ), 44 Oil Spi lIs: "Researchers Predict Oil Spill Movements Using Computer Power," 21/5 (May), 41 "Uon't Die, Ducky, Don't Die ••. ," by Bradley Yaeger & Associates, 21/8 (Aug,), 40 Oklahoma State Tech College, "Scholarship Program for Minority Group Students," 21/12 (Dec.), 44 "The Old Brain, The New Brain, The Giant Brain, and Common Sense," by Edmund C. Berkeley, 21/4 (Apr.), 6 "On the JJ Command." from TOTf~ Rambol and Edmund C. Berkeiey, 21/10 (Oct.), 37 "On the Legal Side: Company Name Selection," by Milton R. Wessel, 21/5 (May). 29 "On the Legal Side: A Lien on Computer Tapes?," by 'lilton R. Wessel, 21/6 (June), 39 "On the Legal Side: The Outside Director," by Milton R. Wessel, 21/4 (Apr.), 7 "Only People Massed Together Can Alter Systems," by William ,I. Kunstler, 21/9 (Sept,), 20 "'Operation Bookstrap' Is Helping Johnny To Read," by II, .J. Peters, 21/1 (Jan.), 49 "Operation Clean Sweep -- A City's War on Crime," by James P. Alexander, 21/2 (Feb.), 51 Opportunities Industrialization Center. "Free Campu ter Trai n- ing Center Coming to Harlem, NY," 21/5 Olay) , 42 Organizations: "Geographic Roster of Organizations in Computers and Data Processing," 21/6B (Aug.), 51 "Roster of Organiz3tions in Computers and Data Processing." 21/6B (Aug.), 4 "Over 2300 Applications of Computers and Data Processing," by Linda Ladd Lovett, 21/6B (Aug.), 137 "Oversupply of People in the Computer Field," by Dahl A. Gerberick, 21/12 ([Jec.). 23 POS equipment, "Data Center Services Offered Smaller Stores Installing Electronic pas Equipment." 21/8 (Aug.), 44 "Pacification: The Story of Ba loi," American Friend:s Service Committee, 21/7 (July), 37 Papert, Dr. Seymour, "A Computer Laboratory for Elementary Schools," 21/6 (June), 19 Parker, Donn B" "The Antisocial Use of Computers," :.>1/0 (Aug.), "" Parkinson, Robert, "The Dvorak Simplified Keyboard: Forty Years of Frustration," 21/11 (Nov.), 18 Parliament, "Data Banks Endangering Personal Liberty: Report of Debate in Parliament, London, England, April 21, 1972," 21/6 (June), 40 Parlova, Frederic 0" and Edmund C. Berkeley, "CDC vs IB~I -Correction," 21/4 (Apr,), 32 "Peacock Courtship" (Computer Art), by Bharat K. Shah, 21/8 (Aug,), 1 Penney, Wal ter -- see "Problem Corner" Pentagon Papers, "A Concerted Campaign To Deny the American People Essential Knowledge About the Operation of Their Government," by Henry Steele Commager, 21/4 (Apr.), 33 People, massed together, "Only People Massed Together Can Alter Systems," by William M. Kunstler, 21/9 (Sept.), 28 "Personal Rapid Transit, Computerized, in ,lorgantown, West Virginia, Part 1: The Plan," by William W. Aston, 21/6 (June), 11 "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part 11: The Computer as the Heart of Personal Rapid Tnnsit," by Dr. Samy E. G. Elias, II. E, Ward, and Michael Wilson, 21/6 (June), 13 Personal response, IIAchieving 'Personal' Response from a Computer," by Edmund C. Berkeley, 21/3 (Mar.), 6 "Persuasion -- Italian Style," by Peter Tumiati, 21/6 (June), 41 Peters, H. J., '''Operation BookStrap' Is Helping Johnny To Read," 21/1 (Jan.), 49 Pheasants, "Movement of South Dckota Pheasants Tracked by Computer," by Dr. Donald Progulske, 21/1 (Jan.), 48 Phister, ,Iontgomery, Jr" and Edmund C. Berkeley, "Post,llaturi ty in the Computer Field," 21/12 (Dec.), 6 Phonograph needle, "Invisible Phonograph Needle in Development by Navy," 21/9 (Sept.), 43 Photographs, "Eight Photographs of a Bush: Pictorial Reasoning Tests -- Part 7," by Nei 1 ,Iacdonald, 21/10 (Oct.), :27 Physician training, "CAl (Computer-Aided Instruction) Shortens Physician Learning Process," ~1/12 (Dec.), 43 Pictorial Heasoning, "Eight Photognphs of a Bush: Pictorial Reasoning Tests -- Part 7," by Neil ,llacdonald, 21/10 (Oct.). 27 "Pictorial Reasoning Tes ts -Analysis and Answers," by Neil ,lacdonald, 21/3 Olar.), "Pictorial Reasoning Test -C&A No, 2," 21/2 (Feb.). 30 "Pictorial Reasoning Test -C&A No.3," 21/2 (Feb,), :11 "Pictorial Reasoning Test: C&A No, 4," 21/3 (Mar,), 26 "Pictorial Reasoning Test: C&A No.5," 21/3 Olar.), 27 "Pictorial Reasoning Test: C&A Nu, 6," :21/4 (Apr.), 27 "Pictorial Reasoning Test: C&A No.7," 21/7 (July), 27 "Pictorial Reasoning Tests Part 5," by Neil Macdonald, 21/4 (Apr.), 26 "Pictorial Reasoning Tests -Part 6," by Neil Macdonald, 21/7 (July), 26 "Pictorial Reasoning Tests and Apti tudes of People -- Ill," by Neil Macdonald, 21/2 (Feb.), 29 Pietak, Raymond A., "The Computer and the Communi ty College," 21/1 (Jan.), 9 Pipeline, "The Alaska Pipeline Reading Lesson," by Stewart ;~. Ilrandborg, 21/6 (June), 30 Plot ter, "CalComp Plot ter Purchased for Russian Ministry of Chemical Industry," 21/8 (Aug.), <15 "Poinciana, !';ew Florida City, Being Planned with Aid of Computer," .lcDonnell Douglas Automation Co., 21/2 (Feb.), 51 Poisoning, "Lead Poisoning: The lIypocrisy of the Presidency, and of the Appropriations Commi t tee of the 1I0use of Representatives," by William L. Clay, 21/8 (Aug.), 7 Police cruisers, "Computer Now Rides Up Front in Police Cruisers," by Chuck Gillam, 21/1 (Jan.),50 "Political Assassination in the Uni ted States," 21/:; (May), 7 Political behavior, "Computer Helps Analyze Worldwide Political Behavior," 21/7 (July), 40 "Political Lies: An Acceptable Leve I?," by Richard M. Nixon, and J, William Fulbright, and others, 21/4 (Apr.), 44 Pollert, William R" "Computerizing A Membership Association," 21/4 (Apr,), 21 Pollution: "Aerial Photography and Computers Aid the Battle A~ainst Blight and Pollution," by Dr. David Landgrebe, 21/1 (Jan.),48 "Air-Pollution Game To Deal wi th Environmental Problems," by Prof. Matthew J. Reilly, 21/1 (Jan.), 50 "Pontiac Dealers Use Computer To lrack Car Production for Consumers," by Williom F. Grimshaw, 21/2 (Feb.), 51 "Post-Maturi ty in the Computer Field," by Edmund C. Berkeley, and r,lontgomery Phister, Jr., 21/12 (Dec.), 6 Power networks I "Computers To Handle Problems on National Economy, Power Networks and Ecology," :.>1/6 (June), 45 "The Present Role of Governments in the World Computer Industry," by C. W. Spangle, 21/12 (Dec.), 16 President: "The Death of the Democratic Party Candidate for the Presidendy, 1972," by Edmund C. Berkeley, 21/5 Olay) , 6 "Lead Poisoning: The lIypocri sy of the Pres idency, and of the Appropriations Commi t tee of the House of Representatives," by William L. Clay, 21/0 (Aug.), 7 "The Shooting of Governor George C. Wallace, Candidate for President," by Edmund C. Berxeley, 21/7 (July), 10 "The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion," by Thomas Stamm and Edmund C. lJerkeley, 21/7 (July),32 "Prevent ~listnkes Before They Happen?": 21/7 (July), 8; 21/ 9 (Sept.), 3; 21/10 (Oct.), 2 Prisoners, "Computer Loaned to ,Ilassachuset ts Prisoners," 21/5 (,llay), 43 Privacy, "Cryptology, The Computf'r, and UClt8 Privacy," by ,\1. Il. Girstiansky, 21/,] (Apr.), 12 Probability, "Statistics and ProiJability: An Introduction 'I hrough Exper imen t s," 21/11 (I'\ov.), 52 PROBLE ~I CORNEl! by Wal ter Penney: 21/1 (Jan.), 59; 21/2 (Feb.), 57; 21/3 Olar.), 49; 21/4 (Apr.), 49; 21/5 Olay) , 26; 21/6 (June), 49; 21/8 (Aug.), 50; 21/9 (Sept.), 50; 21/10 (Oct.), 28; 21/11 (Nov.), 25; 21/12 (Dec.), 23 "Problem 721: A Scheme of Sorts," by Walter Penney, 21/1 (Jan.), 59 "Problem 722," by Wal ter Penney, 21/2 (Feb.), 57 "Proulem 723: Behind the Eight Ball," by Wal ter Penney, 21/3 ("Iar.), 49 "Problem 724: Chafing at the Bit," by Walter Penney: 21/ 4 (Apr.), 49 "Problem 725: StUCk-Up StickOns," by Walter Penney, 21/5 (May), 26 "Problem 726: A Popularity Program," by Walter Penney, 21/6 (June), 49 "Problem 727: Bi ts Make Hi ts I" by Wal ter Penney, 21/0 (Aug.), 50 "Problem 729: A Square Problem," by Walter Penney, 21/9 (Sept.), 50 "Problem 7210: Bi llet-Doux," by Walter Penney, 21/10 (Oct.), 28 "Problem 7211: ,\Ionte Carlo," by Walter Penney, 21/11 (Nov.), 25 "Problem 7212: No Losers," by Walter Penney, 21/12 (Dec.), 23 Problems, "Deal ing wi th Today' s Problems," by John Skowronski, 21/4 (Apr.), 7 Products, "Buyers' Guide to Products and Services in Computers and Data Processing," 21/6B (Aug.),63 Profi t, "Sixth Annual Computer Services Industry Study Shows Profit for 1971," 21/11 (1';0\,.), 39 Prograrruner's assistant, "'Uo What 1 Mean': The Programmer's Assistant," by Warren Teitelman, 21/4 (Apr.), 8 Programming Languages. "Ros te r of Programming Languages 1972," by Jean E. Sammet, 21/6B (Aug.), 123 Progulske, Dr. Donald, "Movement of South Dakota Pheasants Tracked by Computer," 21/1 (Jan.), 48 "The Promotion of Domestic Dis- cord," by Vincent J. Salandria, 21/1 (Jan.), 37 Protection, "BHAINIAC Homeowner's Protective Kit K40," 21/3 (Mar.), 3 "Publishing Articles on Issues that Don't Get the Attention They Deserve," from M. Egan and Edmund C. Berkeley, 21/10 (Oct.),38 "The Pursuit of Truth in Input, Output, and Process ing," by Edmund C. Berkeley, 21/8 (Aug.), 6 Q "Questions and Answers About 'The C&A Notebook'," 21/4 (Apr.), 3 "Questions and Answers about 'The C&A Notebook on Common Sense, Elementary and Advanced''': 21/1 (Jan.), 2; 21/7 (July), 9 R RCA, "Sperry Rand and RCA Sign Final Agreement," by D. F. Kyle, 21/2 (Feb.), 53 RFPs, "Ode in Celebration of RFPs," by Michael Lipp, 21/5 (May), 29 Railroad: "Computer Keeps 'Railroad' Running Smoothly," 21/ 3 ('Iar.), 40 "French National Railway Implements Additional Computerization To Enhance Profi tabili ty," 21/9 (Sept.), 40 Raiteri. J. ;Iark, "Color Matching by Computer Creates a New Business," 21/1 (Jan.), 50 Rambol, Tore, and Edmund C. Berkeley, "On the JJ Command," 21/10 (Oct.), 37 Rapid transit: "Personal Rapid Transi t, Computerized, in Morgantown, West Virginia, Part I: The Plan," by William W. Aston, 21/6 (June), 11 "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part II: The Computer as the Heart of Personal Rapid Transit," by Dr. Samy E. G. Elias, R. E. Ward, and Michael Wilson, 21/6 (June), 13 Reading, '''Operation Bookstrap' Is Helping Johnny To Read," 21/1 (Jan.), 49 "The Reali ty Behind the Lies in South Vietnam." by Dr. George Wald, 21/12 (Dec.), 31 "Real-Time Pictures of Mars by Mariner and by Compuier," by Wayne E. Shufelt, 21/6 (June), 7 Rebellion, "Horizons and Rebellion," by Edmund C. Berkeley, 21/9 (Sept.), 36 "Reducing and Dismantling Science and Research Institutions, and Social Responsibility," by Andrew G. Michalitsanos, 21/4 (Apr.),32 Reilly. ,Ilatthew J., "Air-Pollution Game To Deal with Environmental Problems," 21/1 (Jan.), 50 Republ icans, "Walter Sheridan -Democrats' Investigator? or Republicans' Countermeasure?," by Richard E. Sprague, 21/11 (Nov.), 29 "Researchers Predict Oil Spill Movements Using Computer Power," 21/5 (May), 41 Riordan, Francis J., "Telephone Rate Structures: A Squeeze for the Average American," 21/12 (Dec.), 8 Robot: "Industrial Robot Will Automatically Select and Match Actions to Changing Job Requirements," by Michael M. ,Ieyers, 21/1 (Jan.), 50 "The Construction of Living Robots -- Part 1," by Edmund C. Berkeley, 21/8 (Aug.), 27 "Roster of College and University Computer Facili ties," 2l/6B (Aug.), 149 "Roster of Computer Associations," 21/6B (Aug.), 160 "Hoster of Computer Users Groups," 21/(JIJ (Aug.), 177 Ho~ t"r, GeO\lraphic, "Geographic Host"r of Oqprdzations in ComIlutf'rs :infl Data Processing," :.!l/I,H (,\UU.), Sl "llost,'r of Organizations in Com- 27 Annual Index puters and Data Processing," 2l/6B (Aug.), 4 "Roster of Programming Languages 1972," by Jean E. Sammet, 2l/6B (Aug.), 123 Russian Ministry of Chemical Industry, "CalComp Plotter Purchased for Russian Ministry of Chemical Industry," 21/ 8 (Aug.). 45 Sagatelyan, Mikhail: "Dallas: Who, How, Why? -- Part 1," 21/3 (Mar.), 28 "Dallas: Who, How, Why? Part II," 21/4 (Apr.), 37 "Dallas: Who, How, Why? -Part III," 21/5 (May), 34 "Dallas: Who, How, Why? -IV: Conclusion," 21/6 (June), 34 St. Louis Board of Education, "Textbook Control System Saves Dollars for St. Louis Taxpayers," 21/11 (Nov.), 41 Salandria, Vincent J., "The Promotion of Domestic Discord," 21/1 (Jan.), 37 Sammet, Jean E., "Roster of Programming Languages 1972," 21/ 6B (Aug.), 123 Samson Science Corp., "IBM's Powerful Partner: The Accounting Principles Board," 21/4 (Apr.), 31 Sanford, W. Leon, "EDP Axioms -A Critical Analysis," 21/5 (May), 12 Sanomat, Helsingen, and Ian Low, Judy Bellin, Bella Abzug, Edmund C. Berkeley, "How Fiendish Can You Get?," 21/5 (May), 31 Santa Marie, CA, "Water Meter Readings Streamlined by Computer," 21/8 (Aug.), 43 Satellite, "Navy and Commercial Users Share Navigational Satellite," 21/12 (Dec.), 45 "Satisfaction of Companies with Services Received from EDP Service Bureaus," by Michael J. Cerullo, 21/1 (Jan.), 43 Schmidt, Steven A., "Who-OO-oo00 Is Watching You," (Computer Art), 21/8 (Aug.), 19 "Scholarship Program for Minority Group Students," 21/12 (Dec.), 44 School computer systems, "DEC's New School Computer Systems," 21/12 (Dec.), 44 "Scientists Obtain First ThreeDimensional Look at Glaciers with Help of Computer," 21/3 (Mar.), 39 Scrivener, R. C., "Computers and Communicat ions," 21/9 (Sept.), 10 Seaters, Mike, "Columbus Plus Two" (Computer Art), 21/8 (Aug~), 15 "Secrecy in the Data Processing Industry," by J. L. Dreyer, 21/8 (Aug.), 24 Secretary, "How Technology Is Freeing the Secretary," by Evelyn Berezin, 21/10 (Oct.), 15 Services, "Buyers' Guide to Products and Services in Computers and Data Processing," 21/ 6B (Aug.), 63 Sewers, "Baton Rouge Monitors Sewers with New Computer System," 21/11 (Nov.), 41 Shah, Bharat K.: "Peacock Courtship" (Computer Art), 21/8 (Aug.), 1 "Sunfis h" (Computer Art), 21/ 8 (Aug.), 8 Shanks, J. P., "Educational Television Transmission System Connects Universities and Industries," 21/1 (Jan.), 49 Shao, Paul, and Kenneth F. Dunker: "Lak Gou" (Computer Art), 21/8 (Aug.), 16 "Nine Perspective Projections," (Computer Art), 21/8 (Aug.), 10 Shapin, Ruth, Mrs .. and Mrs. Lucy Bell, William H. Wynne, Rainer M. Goes, Thomas D. Bryant, "Encouragement for the Pursuit of Truth," 21/11 (Nov.), 38 "SHARE and the Mul tiply Carry Bug," by Herb Bright, 21/2 (Feb.), 50 Sheridan, Walter, "Wal ter Sheridan -- Democrats' Investigator? or Republicans' Countermeasure?," by Richard E. Sprague, 21/11 (Nov.), 29 28 "The Shooting of Governor George C. Wallace, Candidate for President," by Edmund C. Berkeley, 21/7 (July), 10 "The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion," by Thomas Stamm and Edmund C. Berkeley, 21/7 (July), 32 Shufeldt Cadillac, Inc., "Computer Tell s Car Owners When Maintenance Is Needed," 21/10 (Oct.), 43 Shufel t, Wayne E •• "Real-Time Pictures of Mars by Mariner and by Computer," 21/6 (June), 7 Siemens, Germany, "Videotelephony Via Glass Fiber," 21/11 (Nov.), 42 Simis, T. L., "Telephone Service: The Rules of the Game When the Game is Changing," 21/12 (Dec.), 13 Simulation, "Benchmarking vs. Simulation," by Fred C. Ihrer, 21/11 (Nov.), 8 "Sixth Annual Computer Services Industry Study Shows Profit for 1971," 21/11 (Nov.), 39 "60 Second Order Processing at Warehouse Distribution Center," 21/12 (Dec.), 42 Skowronski, John, "Dealing wi th Today's Problems," 21/4 (Apr.), 7 "Sky Lab WVB" (Computer Art), by Thomas J. Huston, 21/8 (Aug.), 12 "Small Computer 'Tracks' Great Lakes Sailors," 21/9 (Sept.), 41 Smith, Stuart, "Computer Music in 1972," 21/10 (Oct.), 16 Sobieraj, R. A.. and Otis Minot, K. D. Streetman, "Computers, Ciphers, and Cryptography," 21/2 (Feb.), 47 Social rag, "Computer-Field Information vs, Social Rag," by Arthur Martin and Edmund C. Berkeley, 21/7 (July), 36 Social respons ibili ty, "Reducing and Dismantling Science and Research Insti tutions, and Social Responsibi Ii ty," by Andrew G. Michalitsanos, 21/4 (Apr.), 32 Society: "The Impact of the Computer on Society -- Some Comments," by Joseph Weizenbaum, 21/7 (July), 18 "Some Responsibility for Our Chaotic Society," by S. R. Harrison, 21/4 (Apr.), 34 Software practices, "The High Cost of Vendor's Software Practices: Why?," by Raymond E. Boche, 21/12 (Dec.), 20 "Some Basic Arithmetical Tables," 2l/6B (Aug.), 179 "Some Hard Fac ts, and What To Do About Them," by Edmund C. Berkeley, 21/10 (Oct.), 3 "Some Responsibility for Our Chaotic Society." by S. R. Harrison, 21/4 (Apr.), 34 South Vietnam, "The Real ity Behind the Lies in South Vietnam," by Dr. George Wald, 21/12 (Dec.), 31 Southern California, Univ. of, "Computer Helps Analyze Worldwide Political Behavior," 21/ 7 (July), 40 Spangle, C. W., "The Present Role of Governments in the World Computer Industry," 21/ 12 (Dec.), 16 Spelling, "Computers and Spelling," by Edmund C. Berkeley, 21/11 (Nov.), 6 "Sperry Rand and RCA Sign Final Agreement," by D. F. Kyle, 21/ 2 (Feb.), 53 Sperry Rand, Univac Division, '~Hurray for the Univac Division of Sperry Rand," by Edmund C. Berkeley, 21/1 (Jan.), 6 "Spotlight on McGeorge Bundy and the White House Situation Room, November 22, 1963," by Robert B. Cutler, 21/1 (Jan.), 57 Sprague, Richard E.: "The June 1972 Raid on DemocratiC Party Headquarters," 21/8 (Aug.), 33 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -Part 2," 21/10 (Oct.), 18 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -Part 3," 21/12 (Dec.), 24 "Wal ter Sheridan -- Democrats' Investigator? or Republ icans' Countermeasure?," 21/11 (Nov.), 29 Sprague, Richard E., and Norman R. Carpenter, Business Week, "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM - II," 21/3 (Mar.), 19 Sprague, Richard E., and William W. Harper, "The Assassination of Senator Robert F. Kennedy: Proofs of Conspiracy and of Two Persons Fir ing," 21/9 (Sept.), 24 Stamm, Thomas, and Edmund C. Berkeley, "The Shooting of Presidential Candidate George C, Wallace: A Systems-Analysis Discussion," 21/7 (July), 32 "Statistics -- A Guide to the Unknown," by Edmund C. Berkeley, 21/10 (Oct.), 6 "Statistics and Probabili ty: An Introduction Through Experiments," 21/11 (Nov.), 52 Statute system, "Mississippi's Computer ized Statute Sys tern, to 21/10 (Oct.), 43 Steel producer, "Swedi sh Stee 1 Producer Linked to G.E. Computer in Cleveland," 21/11 (Nov.). 41 Stewart. William H., Jr., "Internal Revenue Service: Use of Computers." 21/4 (Apr.), 34 Strassburg, Bernard, "Does Telephone Regulation Protect the User?," 21/12 (Dec.), 11 Streetman, K. D., and Otis Minot, R. A. Sobieraj, "Computers, Ciphers, and Cryptography," 21/2 (Feb.), 47 Subjects, significant, "The Neglect of Significant Subjects, and the Information Engineer," by Peter J. Nyikos and Edmund C. Berkeley, 21/7 (July), 30 Subscriber, "Unhappy Subscriber to Satisfied One," from John Kaler and Edmund C. Berkeley. 21/7 (July), 38 "Subscription Errors: C&A Will Correct," from Jim Johnson and Edmund C. Berkeley. 21/11 (Nov.), 39 "Sunfish," (Computer Art), by Bharat K. Shah, 21/8 (Au~.), "Supertanker Features Computer System," 21/5 (May), 42 "Swedish Steel Producer Linked to G.E. Computer in Cleveland," 21/11 (Nov.), 41 Syosset, N. Y., "Cashless-Society Project Reports Progress in N. Y. ," 21/7 (July), 41 Systems, social, "Only People Massed Together Can Alter Systems," by William M. Kunstler, 21/9 (Sept.), 28 Systems-analysis, "The Shooting of Presidential Candidate George C. Wallace: A SystemsAnalysis Discussion," by Thomas Stamm and Edmund C. Berkeley, 21/7 (July), 32 T Tactical Air Command, "The Checkerboarding Problem," 21/1 (Jan.), 24 Tanker, "Supertanker Fe atures Computer System," 21/5 (May), 42 Tapes, computer, "On the Legal Side: A Lien ·on Computer Tapes?," by Milton R. Wessel, 21/6 (June), 39 Tax fund act, "World Peace Tax Fund Act -- Proposed Legislation," by Representative Ronald V. Dellums, 21/10 (Oct.), 36 Teitelman, Warren, '''Do What I Mean': The Programmer's Assistant," 21/4 (Apr.), 8 le1ephone: "Computer Helps Develop Tomorrow's Telephone System," 21/9 (Sept.), 41 "Does Telephone Regulation Protest the User?, to by Bernard Strassburg, 21/12 (Dec.), 11 "Telephone Rate Structures: A Squeeze for the Average American," by Francis J. Riordan, 21/12 (Dec.), 8 "Telephone Service: The Rules of the Game When the Game is Changing," by T. L. Simis, 21/ 12 (Dec.), 13 "Telephone-Sized Computer, BR1018, Moves Into Production," 21/10 (Oct.). 45 Televis ion, educational, "Educational Television Transmission System Connects Universities and Industries," by J. P. Shanks, 21/1 (Jan.), 49 "Tenth Annual Computer Art Contest": 21/5 (May), 40; 21/6 (June), 41; 21/8 (Aug.), 8 Test -- see Pictorial Reasoning Test "Business Programmer Exam Announcements and Study Guides Now Available," 21/9 (Sept.), 42 "Textbook Control SysTem Saves Dollars for St. Louis Taxpayers," 21/11 (Nov.), 41 Thinking, "Computer Thinking," by G. M. R. Graham, 21/3 (Mar.), 17 "Three Dimensional Maps from Computer," 21/12 (Dec.), 42 "3400 Organizations Required by Court Order to Furnish Confidential Data to IBM," by Leon Davidson, John D. French, Norman R. Carpenter, and Philip Neville, 21/2 (Feb.), 21 "3400 Organizations Required by Court Order to Furnish Confidential Data t() IBM - II," by Richard E. Sprague, Norman R. Carpenter, and Business Week, 21/3 (Mar.), 19 Tiffany lampshades, "Computer Helps Firm Produce TiffanyInspired Lampshades," 21/8 (Aug.), 42 Timesharing system, "English College's Timesharing System Has 3000 Users," 21/11 (Nov.), 42 "Tiny Lamps that Glow for 100 Years," Western Electric Company, Inc .. 21/2 (Feb.), 53 Tirney, Thomas R.. "Education for Data Processing: Yesterday, Today, Tomorrow," 21/7 (July), 14 Toll calls, "No.4 ESS Will Triple Toll Call Capacity," 21/8 (Aug.), 45 Townsend, D. R., "Effective Mana\lement of an I nstrument Pool," 21/5 (May), B Toxicology, "TOXICON Service Begins Operations," 21/10 (Oct.), 44 "Toxicol()gy Research Data Available Via On-Line Nationwide Network," 21/6 (June), 44 "TOXICON Service Begins Operations," 21/10 (Oct.), 44 Traffic problems, "Harbor Surveillance System Foresees Collisions, Surface Traffic Problems," 21/3 (Mar.), 41 Traffic regulation, "Camera Plus Computer for Traffic Regulation: A New Observing System for Multi-Purpose Data Gatherin·g," by Stanley E. Wilkes, Jr., 21/9 (Sept.), 7 Training, "Georgia Inaugurates Statewide Computerized Training Program in Vocational Technical Schools," 21/8 (Aug.), 44 Training center, "Free Computer Training Center Coming to Harlem, NY," 21/5 (May), 42 "A Transportation Information System," by Anthony J. D'Anna, 21/9 (Sept.), 14 Tree-care, "Computer Helps a TreeCare Company Schedule and PI an, " 21/6 (June), 44 Truth: "Encouragement for the Pursuit of Truth," from Mrs. Ruth Shapin, Mrs. Lucy Bell, William H. Wynne, Rainer M. Goes, and Thomas D. Bryant, 21/11 (Nov.), 38 "The Pursuit of Truth in Input, Output, and Processing," by Edmund C. Berkeley, 21/8 (Aug.), 6 Tumiati, Peter. "Persuasion -Italian Style," 21/6 (June), 41 "Two Wisconsin Rivers Are Cleaner -- Officials Credit Computer," 21/9 (Sept.), 41 Typewri ting, "The Dvorak Simplified Keyboard: Forty Years of Frustration," by Robert Parkinson, 21/11 (Nov.), 18 Typists, "The Shortage of Good Typists -- and the JJ Command," by Edmund C. Berkeley, 21/6 (June), 6 u "Undergraduate Mathematics Training in 1984 -- Some Predictions," by Dr. Murray Gerstenhaber, 21/11 (Nov.), 11 "Unhappy Subscriber to Sati sfied One," from John Kaler and Edmund C. Berkeley, 21/7 (July),38 Uni ted Air Lines, "New Computers for United Air Lines," 21/9 (Sept.),42 "The U.S. Center for Computer Sciences and Technology," by Ruth M. Davis, 21/3 (Mar.), 7 Uni vac computers, "French National Railway Implements Additional Computerization To Enhance Profitability," 21/9 (Sept.>, 40 Univac Div., Sperry Rand, "Hurray for the Univac Division of Sperry Rand," by Edmund C. Berkeley, 21/1 (Jan.), 6 Uni versi ties, "Roster of College and Universi ty Computer Facilities," 21/6B (Aug.), 149 "University Computer Helps Doctors wi th 'Bedside Teaching' ," 21/11 (Nov.), 42 "Unsettling, Disturbing, Critical ... ": 21/4 (Apr.), 34; 21/5 (May), 28; 21/7 (July), 35; 21/9 (Sept.), 35; 21/10 (Oct.), 39; 21/11 (Nov.), 31; 21/12 (Dec.), 33 Users Groups, "Roster of Computer Users Groups," 2l/6B (Aug.), 177 Utilities: "Does Telephone Regulation Protect the User?," by Bernard Strassburg, 21/12 (Dec.), 11 "Telephone Rate Structures: A Squeeze for the Average American," by Francis J. Riordan, 21/12 (Dec.), 8 "Telephone Service: The Rules of the Game When the Game Is Changing," by T. L. Simis, 21/12 (Dec.), 13 v Vectors' Staff, "Forty + One Ways To Cut a Coat," 21/3 (Mar.), 22 "Videotelephony Via Glass Fiber," 21/11 (Nov.), 42 Vietnam, "Moment of Truth in Vietnam?," from Charles A. Wells, 21/10 (Oct.), 39 Vocational Technical Schools, "Georgia Inaugurates Statewide Computerized Training Program in Vocational Technical Schools," 21/8 (Aug.), 44 w Wald, George, "The Reality Behind the Lies in South Vietnam," 21/ 12 (Dec.), 31 Wallace, George C.: "The Shooting of Governor George C. Wallace Candidate for President," by Edmund C. Berkeley, 21/7 (July). 10 "The Shooting of Presidential Candidate George C. Wallace: A Systems-Analysis Discussion," by Thomas Stamm and Edmund C. Berkeley, 21/7 (July), 32 "Wal ter Sheridan -- Democrats' Investigator? or Republicans' Countermeasure?," by Richard E. Sprague, 21/11 (Nov.), 29 Wang Laboratories, "New Algebra Option Promises Breakthrough in Calculator Programming," 21/8 (Aug.), 44 Ward, R. E., and Dr. Samy E. G. Elias, Michael Wilson, "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part II: The Computer as the Beart of Personal Rapid Transit," 21/6 (June), 13 Warehouse distribution, "60 Second Order Processing at Warehouse Distribution Center," 21/ 12 (Dec.), 42 Warehousing system. "New HighDensi ty Warehousing System Announced by Litton UIlS," 21/9 (Sept.), 42 Warfare, "How Fiendish Can You Get?," by Helsingen Sanomat, Ian Low, Judy Bellin. Bella Abzug. and Edmund C. Berkeley. 21/5 (May), 31 I, Annual Index "Water Meter Readings Streamlined by Computer," 21/8 (Aug.), 43 Watergate incident: "Bernard L. Barker: Portrait of a Watergate Burglar," by Edmund C. Berkeley, 21/11 (Nov.), 26 "The June 1972 Raid on Democratic Party Headquarters," 21/8 (Aug.), 33 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -Part 2," by Richard E. Sprague, 21/10 (Oct.), 18 "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident) -Part 3," by Richard E. Sprague, 21/12 (Dec.), 24 Weizenbaum, Joseph, "The Impact of the Computer on Society -Some Comments," 21/7 (July), 18 Wells, Charles A., "Moment of Truth in Vietnam?," 21/10 (Oct.), 39 Wessel, Mil ton R.: "Computers at Crisis," 21/2 (Feb.), 10 "On the Legal Side: Company Name Selection," 21/5 (May), 29 "On the Legal Side: A Lien on Computer Tapes?," 21/6 (June), 39 "On the Legal Side: The Outside Director," 21/4 (Apr.), 7 Western Electric Company, Inc.: "Helping Out," 21/7 (July), 42 "Tiny Lamps that Glow for 100 Years," 21/2 (Feb.), 53 Wetterhuus, Alan, "The Cashless, Checkless Society: On Its Way?," 21/11 (Nov.), 14 "What Have Computers Done for Us Lately?," by Congressman Jack 8rooks, 21/10 (Oct.), 7 "Whiskered Frisby" (Computer Art), by Judy Dayhoff, 21/8 (Aug.), 13 Whi te House Si tuation Room, "Spotlight on McGeorge Bundy and the White House Situation Room, November 22, 1963," 21/ 1 (Jan.), 57 Whitehead, Clay T., "The Information Industry and Government Policy," 21/4 (Apr.), 24 "Who Shot President Kennedy -or Fact and Fable in History," by Gareth Jenkins, 21/2 (Feb.), 43 "Who-OO-oo-oo Is Watching You" (Computer Art), by Steven A. Schmidt, 21/8 (Aug.), 19 "Who's Who in Computers and Data Process ing": 21/5 (May), 30; 21/6 (June), 2; 21/7 (July), 2; 21/8 (Aug.), 2; 21/10 (Oct.), 30; 21/11 (Nov.), 37; 21/12 (Dec.), 41 Wilkes, Stanley E., Jr., "Camera Plus Computer for Traffic Regulation: A New Observing System for Multi-Purpose Data Gathering," 21/9 (Sept.), 7 Williams, Arthur, "Marriage of Computers Meets Special Data Process ing Needs of B. F. Goodrich," 21/1 (Jan.), 49 ,\(tlson, Michael, and Dr. Samy E. G. Elias, R. E. Ward, "Personal Rapid Transit, Computerized, in Morgantown, West Virginia, Part II: The Comput.er as the Heart of Persona"! 'Rapid Transit," 21/6 (June), 13 "Winner of U.S. Chess Championship," 21/11 (Nov.), 43 Wisconsin rivers, "Two Wisconsin Rivers Are Cleaner -Officials Credit Computer," 21/9 (Sept.), 41 Wisdom, "Common Sense, Wisdom, General Science, and Computers -- II," by Edmund C. Berkeley, 21/1 (Jan.), 11 Wood, William P., III, "Do You Want To Stop Crime?," 21/4 (Apr.), 31 "World Computer Census," by Neil Macdonald, 2l/6B (Aug.), 133 "World Peace Tax Fund Act -Proposed Legislation," by Representative Ronald V. Dellums, 21/10 (Oct.), 36 Wright, Douglas, "The Master Discriminatory Tool," 21/9 (Sept.),22 Wynne, William H., and Mrs. Ruth Shapin, Mrs. Lucy Bell, Rainer M. Goes, Thomas D. Bryant, "Encouragement for the Pursuit of Truth," 21/11 (Nov.), 38 XYZ "X-Rays Air Luggage for Bombs at High Speed," 21/5 (May), 43 Yaeger, Bradley, and Associates, "Don't Die, Ducky, Don't Die ...... 21/8 (Aug.), 40 Zimmerman, Bil~, "North Vietnam and American Bombing: Six American Government Lies," 21/9 (Sept.), 33 "ZINGO -- A New Computer Game," by Edmund C. Berkeley, 21/2 (Feb.), 32 "ZINGO -- A New Game for Computers and/or People": 21/3 (Mar.), 2; 21/11 (Nov.), 3 Political Assassination in the United States A Few of the Articles Published in Computers and Automation 1970 - 1971 Titles, Authors, and Summaries James Earl Ray says he was coerced into entering a plea of guilty to killing Martin Luther King •.• and contrary evidence (plus other evidence) have led to filing of legal petitions for "post-conviction relief". May 1970 30 THE ASSASSINATION OF PRESIDENT JOHN F. KENNEDY: THE APPLICATION OF COMPUTERS TO THE PHOTOGRAPHIC EVIDENCE by Richard E. Sprague A reexamination of some of the evidence relating to the assassination of John F. Kennedy -- with emphasis on the possibilities and problems of computerized analysis of the photographic evidence. August 1970 48 THE ASSASSINATION OF SENATOR ROBERT F. KENNEDY: 48 Preface, by Edmund C. Berkeley 50 Two Men With Guns Drawn at Senator Kennedy's Assassination: Statement to the Press, by Theodore Charach 50 Map of the Scene of the Assassination of Senator Robert Kennedy 51 The Pantry Where Senator Robert Kennedy Was Assassinated 52 Bullet Holes in the Center Divider of the Pantry Door September 1970 , 39 PATTERNS OF POLITICAL ASSASSINATION: How Many Coincidences Make a Plot? by Edmund C. Berkeley, Editor, "Computers and Automation" How the science of probability and statistics can be used as an instrument of decision to determine if a rare event is: 0) within a reasonable range; (2) unusual or strange or suspicious; or (3) the result of correlation or cause or conspiracy. October 1970 52 THE CONSPIRACY TO ASSASSINATE SENATOR ROBERT F. KENNEDY AND THE SECOND CONSPIRACY TO COVER IT UP by Richard E. Sprague A summary of what researchers are uncovering in their investigation of what appears to be not one but two conspiracies relating to the assassination of Senator Robert F. Kennedy. December 1970 39 THE ASSASSINATION OF REVEREND MARTIN LUTHER KING, JR., THE ROLE OF JAMES EARL RAY, AND THE QUESTION OF CONSPIRACY by Richard E. Sprague July 1971 51 THE CENTRAL INTELLIGENCE AGENCY AND THE NEW YORK TIMES by Samuel F. Thurston, President, Responsive Information Systems, Newton, Mass. The issue of systematic suppression of questions about the assassination of President John F. Kennedy, and a hypothesis. August 1971 37 JIM GARRISON, DISTRICT ATTORNEY, ORLEANS PARISH, VS. THE FEDERAL GOVERNMENT by Bernard Fensterwald, Attorney, Executive Director, National Committee to Investigate Assassinations How District Attorney Jim Garrison of New Orleans became interested in the New Orleans phase of the assassination of President Kennedy; and how the Federal government frustrated and blocked his investigation in more than a dozen ways. September 1971 26 THE FEDERAL BUREAU OF INVESTIGATION AND THE ASSASSINATION OF PRESIDENT KENNEDY by Bernard Fensterwald, Attorney How J. Edgar Hoover and the FBI withheld much pertinent information from the Warren Commission, flooded them with irrelevant information, and altered some important evidence, thus concealing Oswald's connections with the FBI. October 1971 41 THE ASSASSINATION OF PRESIDENT KENNEDY -- DECLASSIFICATION OF RELEVANT DOCUMENTS FROM THE NATIONAL ARCHIVES by Richard E. Sprague The titles of the documents and other evidence indicate convincingly that Lee Harvey Oswald was trained in spy work by the CIA before his visit to Russia; etc. Like the Pentagon Papers, these documents should be declassified. 29 COMPUTER DIRECTORY AND BUYERS' GUIDE, 1972 18th ANNUAL EDITION ... a special 13th issue of Computers and Automation is off the press and being mailed. The COMPUTER DIRECTORY is: • an annual comprehensive directory of the firms which offer products and services to the electronic computing and data processing industry • the basic buyers' guide to the products and services available for designing, building, and using electronic computing and data processing systems CONTENTS: See at right -~ .~ . PRICE: • Price for subscribers to Computers and Automation whose present subscription does not include the Directory (magazine address label is marked *N) ..... $12.00 • Price for non-subscribers ..... $17.50 NOTE: The Directory is included in the $18.50 full annual subscription (13 issues) to Computers and Automation (magazine address label is marked *0) Computers and Data Processing: Organizations and Products Roster of Organizations in Computers and Data Processing 4 Buyers' Guide to Products and Services in Computers and Data Processing 63 Geographic Roster of Organizations in Computers and Data Processing 51 Roster of College and University Computer Facilities 149 Roster of Computer Associations 168 Roster of Computer Users Groups 177 The Computer Industry Characteristics of Digital Computers by GML Corp., Lexington, Mass. Over 2300 Applications of Computers and Data Processing by Linda Ladd Lovett Counting the Number of ~pplications of Computers by Edmund C. Berkeley 92 137 3 World Computer Census by Neil Macdonald 133 The Computer Directory and Buyers' Guide, 1973 - Notice 176 Entry Forms for the 1973 Computer Directory and Buyers' Guide - Notice 178 Computer Programming Roster of Programming Languages, 1972 123 by Jean E. Sammet, IBM Corp., Cambridge, Mass. Send prepaid orders to: Computers, Mathematics, and Computer Codes cornI?nHE!!!:i! 815 Washington St. Newtonville, Mass. 02160 Some Basic Arithmetical Tables 179 American Standard Code for Information Interchange (ASCII) 180 If not satisfactory, the Directory is returnable in seven days for full refund. 30 COMPUTERS and AUTOMA nON for January. 1973 EIGHT PHOTOGRAPHS OF A BUSH: ANSWERSPictorial Reasoning Tests -Part 8 Neil Macdonald Assistant Editor, Computers and Automation "There undoubtedly is a place for non-verbal, nonmathematical testing which is not culture-limited, not occupation-limited, and not background-limited ... and which would enable finding and employing many useful people -- including programmers -- who do not have American, middle-class backgrounds." The pictorial reasoning tests which we have been publishing since October 1971 require: observation. perception, comparison, recognition of shapes and designs, and reasoning. These operations are difficult for a computer program (except for. the reasoning), yet stimulating to a human being. The techniques needed are those which we as human beings have had to use (and improve) all our lives. New Style of Test In the October issue we published a sample of a new style of test, Style 6. It consisted of eight photographs of the same bush taken from time to time during 1972. The photographs were printed in a random sequence, and the test consisted of a number of questions about the photographs. The photographs were published on successive odd-numbered pages of the October issue of "Computers and Automation" so that a reader might cut the eight pictures out of the magazine, place them side by side, and compare them. Here we give the answers to the test, with some explanation of the observations and the reasoning needed. To understand fully these answers, please refer to the October issue of "Computers and Automati on", to the eight pictures (labeled A to H) printed on pages 29, 31, 33, and 35. Except for the pictures, the following discussion is largely self-contained and is independent of what was printed in the October issue. The introduction to the text contained important information for answering the set of questions: Across from our office which is on the north side of Washington St. in Newtonville, Mass. is a strong wire link fence. This fence separates Washington St. from a steep embankment descending to lower ground, occupied by a railroad and a turnpike. At one place on the steep bank behind the fence grows a vigorous bush which pushes its branches against and through the wire fence. The distance between the left end and the right end of one link in the wire fence has been measured at 3~ inches. This information implies that (1) the photographs were all taken in the same direction, south, and also (2) gives a scale for measuring what is in any picture. Bush. Question 1: What kind of bush is pictured? Answer: A rose bush. The five petaled flower: showing in picture B (two inches in from the left edge, and one inch above the pipe) is typically the flower of..Jl rose. COMPUTERS and AUTOMATION for January, 1973 Chronological Sequence. Question 2: What is the correct sequence of the pictures? Answer: F HE BGCDA Reasons: (1) The buds and the flowers provide the key to the first four pictures. In F, the buds compared with the leaves are smallest. In H, the buds are larger, but there are still no flowers. In E, there is an open flower. In B, there are more open flowers, but many petals have fallen off. In G, D, C, and A, there are no buds and no flowers, and so we have to look further for more evidence. (2) The sepals (bud coverings) provide some of the key for the last four pictures. They are curved out and backwards in pictures G, D, and C; and they have all fallen off in picture A, which is therefore the last. (3) The tallest and most prominent flower stalk showing in pictures F, H, and E, about 3 inches in from the left edge, is missing in. all later pictures. Evidently some one cut it off. The stalk by itself shows in pictures Band G. In D, the stalk has put out a shoot, with pale leaves, ~bout 2 or 3 inches long, showing in front of the pIpe and partially crossing it. In C, the shoot is twice as big, about 5 inches long (entirely crossing the pipe), still with pale leaves; and in A the leaves of the shoot are like the rest of the bush, all of the same degree of darkness; and the shoot is no longer clearly distinct. Time of Day and Compass Direction. Questions 3 and 4: About what time of day were the pictures taken? and what was the approximate compass direction of the sun? Answer: The question implies that all the pictures-were taken at about the same time of day. Inspection of the eight pictures shows that this is reasonable. Picture H shows brightly contrasting light and shadow; at the bottom, about 3 inches in from the left edge, the shadow of a stem falls across the middle of a leaf to the left; therefore, the sun is at the right. To the right of south is west (in the Northern Hemisphere). Therefore, the sun is in the west, and the time of day is the later part of the afternoon. Weather. Question 5: For each picture, was the weather sunny and bright? or hazy and dull? Answer: D, G, and H show sharp contrasts between leaves in sun and leaves in shadow; therefore, in those pictures, the weather was sunny and bright. For the other five pictures, A, B, C, E, F, the weather was hazy and dull, with no sharp shadows. Distance. Questions 6 and 7: What pictures were taken closest and furthest? Answer: It is reasonable to assume that all the pictures were taken with the same kind of camera, lens, and film. (This was in fact true.) By measuring the size of the fence links, or by counting the number of links shown in each picture, we can 31 deduce that D was taken closest to the bush and E was taken furthest away. Duration. Question 8: What was the approximate period of time from the earliest picture to the latest picture? Answer: About two months (or nine or ten weeks). Time Intervals between Pictures. Question 9: What was the approximate interval of time between one picture and the next one? Were all the intervals about the same? Answer: The first seven pictures are about a week apart. The last picture is about three or four weeks after the next to the last. Calendar Date. Question 10: Approximately what calendar date or calendar week was each picture taken? This question can probably be answered well only by someone who actually has uncommon knowledge about roses, and who can adjust his knowledge to the seasons in the Boston area. Under these condi tions, the following answer is deducible from the pictures. Answer: First picture, end of June / Next four pictures, weekly in July / Next two pictures, first week and second week in August / Last picture, first or second week in September. -- The actual dates of the pictures (this of course is not deducible from the pictures) are: F, June 29; H, July 7; E, July 12; B, July 20; G, July 26; D, Aug. 4; C, Aug. 10; A, Sept. 8 (1972). History. Question 11: What were some ten major events that happened to the bush during the period of the series of pictures? Answer: Buds opened into flowers / Flowers bloomed / Flower petals fell off / Sepals (the bud coverings) opened / Sepals bent back / Sepals fell off / Rose haws formed / Rose haws became quite large / Two major flower stalks were picked / The stub of one of the flower stalks put forth a shoot / The shoot grew vigorously / The pale green leaves of the ihoot changed to normally dark green leaves. / Apparently, between the last two pictures, something happened to the top of the shoot, for its top does not show in the last picture; one thing that might have happened is that it withered as a result of late summer drought. I showed this test to a friend of mine who teaches botany: she said "This would be an exce::'lent test for students in botany and biology classes". Whether it is as good a test for persons who have ~nly casual acquaintance with plants is open to question. But there is little doubt in my mind that Sherlock Holmes, Arthur Conan Doylets famous detective character, would have done extremely well on this test -- for he made it his business to be as observant as possible of details that related to deducing conclusions about what had happened in relation to crimes or potential crimes. Perhaps some readers of "Computers and Automation" would like to send us a set of 8 related photographs (6 is rather few, 10 is rather many) of a subject, with searching questions in observation and reasoning; we would be much interested in publishing additional pictorial reasoning tests of this nature. Also, does any reader have a computer program [] which might attain a good score on this test? 32 NUMBLES Neil Macdonald Assistant Editor Computers and Automation A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns or is otherwise irregular, to discourage cryptanalytic methods of deciphering. We invite our readers to send us solutions, together with human programs or computer programs which will produce the solutions. This month's Numble was contributed by: Andrew M. Langer Newton High School Newton, Mass. NUMBLE 731 F 0 R E x 5 1 G HT G F E R oGLG0 P N E N G P=E F=R H E 5 H N G L N L H GH5 E NT P 5 1 83270 81294 715 Solution to Numble 7212 In Numble 7212 in the December issue, the digits 0 through 9 are represented by letters as follows: G=O R= 1 N=2 L=3 F, E = 4 5=5 C=6 1=7 0=8 A=9 The message is: Life is a dancing girl. Our thanks to the following individuals for submitting their solutions - to Numble 7211: Harold Schofield, Davenport, Ia.; Jack Smock, Palo Alto, Calif. - to Numble 7210: E. A. Finn, Tucson, Ariz. - to Numble 729: T. M. Kaegi, CH-9500 Wil, Switzerland; M. H. Davies, Bath, England. COMPUTERS and AUTOMATION for January. 1973 President Richard M. Nixon, the Bay of Pigs, and the Watergate Incident Richard E. Sprague Hartsdale, N. Y. 10530 "The similarities between the actions of E. Howard Hunt, Jr., James McCord, Bernard Barker, Frank Sturgis, and others in 1960 planning for the Bay of Pigs and in 1972 planning for re-election of Richard M. Nixon are very striking." Introduction This article is another installment of a continuing report on the Watergate Incident, and its ramifications. The incident consisted of the breaking in of the offices of the National Committee of the Democratic Party, on the 6th floor of the Watergate Office Building, Washington, D.C., and resulting arrests. The forced entry took place around 2:30 a.m., Saturday, June 17; five men were arrested by Washington police. They had with them extensive photographic equipment and electronic surveillance devices, and wore rubber surgical gloves. The five men arrested were: -James W. McCord; a Lt. Colonel in the U.S. Air Force Reserve; 19 years service with the CIA; head of a security agency; on the payroll of the Committee to Re-elect the President as late as May 31, 1972; an organizer of the CIA for the Bay of Pigs invasion of Cuba in 1961. -Bernard L. Barker; a Cuban-born Miami business man; long associated with the CIA; he established secret Guatemalan and Nicaraguan invasion bases. -Frank Fiorini (alias Frank Sturgis) -Eugenio R. Martinez -Virgilio R. Gonzalez These men were closely connected with: the Republican Party, the White House, President Richard M. Nixon, the Central Intelligence Agency, and the Committee for Re-Election of the President. COMPUTERS and AUTOMATION for January. 1973 For more information and background, see the prior articles on this subject, published in "Computers and Automation", August, October, and December, 1972. Questions to President Nixon The Watergate Incident raised questions during the election campaign about the relationships between President Richard M. Nixon and the Watergate invasion team. The President denied any knowledge of the Watergate affair and issued statements saying that no one in the White House was connected with the operation. To test the reliability of Mr. Nixon's official statements it is necessary to go back to the campaign of 1960 and the Bay of Pigs. The Bay of Pigs Invasion Many citizens of America have forgotten that Richard Nixon in 1959 and 1960 was Vice President of the United States. As an old anti-communist from Alger Hiss and Khrushchev debate days, Nixon was in the forefront of pressure for the Bay of Pigs invasion of Cuba. What has not been remembered is that Nixon was largely responsible for the covert training of Cuban exiles by the CIA in preparation for the Bay of Pigs. He so stated in his book "Six Crises". Nixon's Lies October 1960 Mr. Nixon's truth-telling capacity during an election campaign is nowhere more clearly demonstrated than by the deliberate lies he told on national TV on October 21, 1960. He said in his book that the lies were told for a patriotic reason, namely to protect the covert operations planned for the Bay of Pigs at all costs. The significance of this is that Mr. Nixon considers patriotism as covering the protection of plans or the actions of individuals that he considers are working for the United States' best interests. 33 The similarities between the actions of.Everette Howard Hunt, Jr., James McCord, Bernard Barker, Frank Sturgis, and others in 1960 planning for the Bay of Pigs and in 1972 planning for the re-election of Richard M. Nixon are very striking. In both cases, what the plotters themselves considered to be patriotic, anti-Communist actions, were involved. In 1960 the actions were directed against Fidel Castro, a man they hated as a Communist. In 1972 the actions were directed against Edward Kennedy, Edmund Muskie, and finally George McGovern. Bernard Barke~ stated the group's collective belief when he said after his arrest that, "We believe that an election of McGovern would be the beginning of a trend that would lead to socialism and communism or whatever you want to call it." ' Nixon admitted lying to the American people to protect Hunt, Barker, Sturgis, and McCord in 1960. The likelihood that he lied to protect them again in 1972 seems to be quite good. The likelihood that he actually hired the same old crew he trusted from the Bay of Pigs days for the 1972 Watergate and other espionage activities, also seems to be rather good. Here are the facts. Nixon's Statements in "Six Crises" Richard Nixon stated in "Six Crises,,:l "The covert training of Cuban exiles by the CIA was due in substantial part, at least, to my efforts. This had been adopted as a policy as a result of my direct support." "President Eisenhower had order the CIA to arm and train the exiles in May of 1960. Nixon and his advisors wanted the CIA invasion to take place before the voters went to the polls on November 8, 1960."2 While the Bay of Pigs operation was under the overall CIA direction of Allen Dulles, Richard M. Bissell, Jr. was the CIA man in charge, according to Ross & Wise. 3 Charles Cabell,4 the deputy director of the CIA, and a man with the code name Frank Bender, were also near the top of the operational planning. 5 E. Howard Hunt Everette Howard Hunt, Jr. was in charge of the actual invasion, using the code name "Eduardo". Bernard L. Barker, using the code name "Macho," worked for Hunt in the CIA Bay of Pigs planning. James McCord was an organizer for the invasion and was one of the highest ranking officials in the CIA. Frank Sturgis, alias Frank Fiorini, was also involved in the Bay of Pigs operations. Virgilio Gonzales was a CIA agent active in the Bay of Pigs and so was Eugenio Martinez. Charles Colson was a former CIA official who knew McCord and Hunt during the Bay of Pigs period. 6 Hunt, Barker, McCord, Sturgis, Gonzales, and Martinez are under indictment for the Watergate affair. Colson is Nixon's special counsel who handles "touchy" political assignments. According to Time magazine, Colson brought all of the others into the re-election committee espionage project at the request of Nixon. 7 In other words, the same basic group who worked for Nixon, Bissell and Co. in 1960, were also working for Nixon, Colson and Co. in 1972. They were all "loyal, patriotic," anti-Communist, anti-Castro CIA agents with covert (black) espionage training. They needed Nixon's protection in 1960 and 1972, and they got it both times. In 1960 here is how Nixon protected them. 8 34 Kennedy-Nixon Debates, 1960 John Kennedy and Richard Nixon engaged in a series of national TV debates during the 1960 campaign. Kennedy was briefed by Allen Dulles, head of the CIA at Eisenhower's request, on secret CIA activities and international problems, on July 23, 1960. Nixon was not aware of the briefing contents and was not sure whether Dulles told Kennedy about the Bay of Pigs plans. As it turned out Dulles had not mentioned the plans but had kept his remarks rather general about Cuba. On October 6, 1960, Kennedy gave his major speech on Cuba. He said that events might create an opportunity for the U.S. to bring influence on behalf of the cause of freedom in Cuba. He called for encouraging those liberty-loving Cubans who were leading the resistance to Castro. Nixon became very disturbed about this because he felt Kennedy was trying to pre-empt a policy which he claimed as his own. Nixon ordered Fred Seaton, Secretary of the Interior, to call the' White House and find out whether Dulles had briefed Kennedy on the Cuban invasion plans. Seaton talked to General Andrew Goodpaster, Eisenhower's link to the CIA, who told Seaton that Kennedy did know about the Bay of Pigs plans. Attack on Kennedy by Lying Nixon became incensed. He said, "There was only one thing I could do. The covert operation had to be protected at all costs. I must not even suggest by implication that the U.S. was rendering aid to rebel forces in and out of Cuba. In fac t, I mus t go to the other extreme: I must attack the Kennedy proposal to provide such aid as wrong and irresponsible because it would violate our treaty commitments. ,,9 So Richard M. Nixon, then our Vice President, now our President, actually went on national TV (ABC) on October 21, 1960, knowing we were going to invade Cuba, and lied like a "patriotic" trouper. He said during the fourth TV debate that Kennedy's proposal was dangerously irresponsible and that it would violate five treaties between the U.S. and Latin America as well as the United Nations' Charter. lO On October 22 at Muhlenberg College, Nixon really turned on the fabrication steam. He said, "Kennedy called for -- and get this -- the U.S. Government to support a revolution in Cuba, and I say that this is the most shockingly reckless proposal ever made in our history by a presidential candidate during a campaign -- and I' 11 tell you why. . .. " The reason we must take with a grain of salt whatever words the President utters about Watergate and Donald Segretti 1 s espionage is clearly demonstrated in that October 22, 1960 speech. He not only fiercely attacked John Kennedy for advocating a plan that he, Richard Nixon, secretly advocated but one that he claimed as his own creation. Not only that, but he later had the sheer gall to brag about it in his own book as a very patriotic act. Today, the "patriotic" act is the re-election of Mr. Nixon, and the prevention of communism from taking over the White House:' Protection of Hunt and Co. How is Nixon protecting Hunt and company now? He is using the Justice Department and the Republican Congressmen, plus others, to delay and dilute the prosecution of the Watergate seven. He has COMPUTERS and AUTOMATION for January. 1973 slowed down. suppressed, and all but stopped six separate investigations, suits, and trials of the affair. These are: Wright Patman's House Banking Committee investigation, the FBI-Justice Department investigation, a White House investigation by John Dean, a General Accounting Office investigation, a suit by the Democratic Party. and a trial in criminal court of the seven invaders. Only two trials or investigations have a chance of exposing the truth. One of these. a trial of Bernard Barker in Florida. has ended with not much help. The other is an investigation promised by Senator Edward Kennedy using his Senate subcommittee. So the battle for truth boils down again to a Nixon vs. a Kennedy. Apparently, the only power or strength in the U.S. since 1959 able to contest the power of Richard M. Nixon and his cohorts is the strength of the Kennedy family and name. Ethel Jean Mother's Totterdale Maiden Name Witches Island. Residence River Road, Potomac. Md. (972) Pseudonyms Robert Dietrich. John Baxter, Gordon Davis Occupation Public Relations Consultant, author, government official Education AB, Brown University, 1940 Military Footnotes , 1. "Six Crises". Richard M. Nixon. Doubleday. 1962. 2. "The Invisible Government". Wise & Ross. Random House. 1964. 3. Ibid. 4. Brother of Earl Cabell. mayor of Dallas when Kennedy was assassinated. 5. Ibid. 6. "New York Times" articles on Watergate. June 18 to July 2. 1972. 7. "Time" magazine. September 8. 1972. 8. This episode is related in detail in "The Invisible Government". 9. "Six Crises". 10. "The Invisible Government". Marital Status Children Career Appendix 1 E. Howard Hunt Who is Everette Howard Hunt? His cover identity as a CIA agent by the name of "Eduardo" during the Bay of Pigs is well known. His novels about spies. writing under the pseudonyms of Robert Dietrich. Gordon Davis. and John Baxter. are also well known. Apparently Mr. Hunt had teason to disguise his true identity when he became an author named Dietrich. At least he seemed to try and mislead the publishing field. The chart below shows how Mr. Hunt described himself to both Who's Who in America. and Contemporary Authors. a publication listing each year new or recent authors. It should be remembered that Who's Who does some checking on the person listed. while Contemporary Authors does not. Contemporary Authors merely reprints whatever the author sends in. Also. the only link in the two publications between the two men is the pseudonym Robert Dietrich listed under Hunt's biography in Who's Who. Awards Clubs USNR 1940-42, USAAF 1st Lt •• Political Officer-Far East Comd. 1954-56 Married-Dorothy Wetzel Sept. 7, 1949 Lisa Tiffany. Kevan. Howard, David Movie script writer. editor March of Time, war correspondent Life magazine 1943, screen writer 1947-48. attached U.S. embassy Paris, France 1948-49. Vienna. Austria 1949-50, Mexico City 195053. Far East Command Tokyo 195456. First Secretary consul Montevideo. Uruguay 1957-60. Dept. of Defense 1960-65. Dept. State 196870, Robert Mullen & Co. 1970-71, Consultant to the President 1971-72 Guggenheim fellow 1946 Brown University (NYC), Army & Navy. Lakewood Country Club Washington, D.C. Comparison of E. Howard Hunt & Robert Dietrich Source Name Birthdate Birthplace Age Father Mother Who's Who in America 1972 Everette Howard Hunt, Jr. October 9. 1918 Hamburg, N. Y. 54 Everette Howard Hunt Ethel Jean Hunt Contemporary Authors 1963 Robert Salisbury Dietrich October 9. 1928 Washington, D.C. 44 Everette Howard Dietrich Ethel Jean Dietrich Writings Hobbies Author 1942-72, Pseudonyms: Robert Dietrich. John Baxter. Gordon Davis; Contributor to foreign affairs and poli tical journals None listed Ethel Jean Totterdale 5029 Millwood Lane, Washington, D.C. (963) Gordon Davis U.S. Government, Internal Revenue Service CPA George Washington University. 1950; LLB, George Washington University, 1957 U.S. Army Infantry 1951-53 Is t Lt., Bronze Star None listed None listed U.S. Government, Internal Revenue Service 1949-51, private tax consultant 195363 None lis ted American Institute of Accountancy, Bar Association District of Columbia. Army & Navy. Lawyers Agent: Littauer & Wilkinson (NYC), office Washington Bldg. Washington. D.C. 11 books listed under Gordon Davis Sailing, shooting. riding (Continucd on next page) COMPUTERS and AUTOMAliON for January, 1973 35 Michie - Continued from page 9 PROBLEM CORNER Walter Penney, COP Problem Editor Computers and Automation PROBLEM 731: A SIMPLE SOLUTION Bob had hardly entered the Computer Center when AI asked him, "Ever have the experience of telling someone how to solve a problem only to have him say, 'We haven't had that yet in this course; we can't use that'?" "Many times," Bob replied. "It's a little like speaking Basic English. You have to keep thinking of what words not to use. What brought this up?" "Joe has a problem in his course which involves finding the larger of two numbers, using a certain very simple computer. It can perform only the operations of addition, subtraction, multiplication, division, and taking the absolute value. Joe's a little puzzled." . "Why doesn't he just subtract one from the other and see whether the result is positive or negative?" "That was his first thought," AI said. "But 'see whether the result is positive or negative' is not in the instruction set of his computer." "Hmm. He might be able to Monte Carlo it. Try all sorts of random combinations of the five operations and ... " "No need to do anything so complicated," Al interrupted. "It's very simple." How can the larger of two numbers be determined using only the operations mentioned? Solution to Problem 7212: No Losers AI, Bob, and Charlie began with $32, $56, and $74 respectively. After the first game they had $96, $24, and $42; after the second game, $72, $72, and $18; and after the third game, $54 each. Readers are invited to submit problems (and their solutions) for publication in this column to: Problem Editor, Computers and Automation, 815 Washington St., Newtonville, Mass. 02160. Sprague (continued from previous page) Appendix 2 Postscript Mrs. E. Howard Hunt was unfortunately killed in a crash of a United Airlines jet at Chicago on December 8, 1972. The crash investigators found in her purse 100 crisp new $100 bills. When Mr. Hunt was queried, he claimed she was carrying the money to a relative in Chicago for a real estate investment. But it is reasonable to suspect that these bills bore serial numbers in the same sequential series as those found on Bernard L. Barker when he was arrested, and that Mrs. Hunt was transferring "hot money" to a new location. 0 36 The Future Although no one has yet begun to apply relational structure techniques to computer chess, these techniques are currently under vigorous development for a wide range of other applications. In our own laboratory in Edinburgh R. M. Burstall, H. G. Barrow, R. J. Popplestone and others have used this approach for writing a "teachable" program for recognizing ordinary objects viewed through the TV camera, with special reference to ultra-fast methods for matching descriptions in the machine and coping with partial matches in a quantitative fashion. A number of laboratories are exploring the use of relational structures - sometimes called "semantic nets" - for storing facts about storybook worlds extracted from English language input. It is a matter of time before the next person to write a chess program avails himself of the new methodology~ No single technique is going to bring about a magic transformation. But the consequences of effective methods for representing chess knowledge could be great. Progr~ms of existing type have knowledge-bases not significantly larger than that of a chess beginner. If the machine look-ahead speed and short-term memory (working space) were not better than human, such programs would necessarily play like beginners. But the speed and accuracy of modern computing hardware, and the large scale of mechanized treesearching operations (Gillogly's program has, at times, a tree containing up to 500,000 possible board positions under review), enable these mechanized ignoramuses to play at tournament level. The "brute force" factor is evidently worth a lot of points on the USCF scale. A Much Stronger Strategy Hence if the knowledge of the chess-master were built into a computer program we would see not master chess, but something very much stronger. As with other sectors of machine intelligence, rich rewards await even partial solutions to the representation problem. To capture in a formal descriptive scheme the game's delicate structure - it is here that future progress lies, rather than in nanosecond access times, parallel processing, or mega-mega-bit memories. An interesting possibility which arises from the "brute force" capabil i ti es of contemporary chess programs is the introduction of a new brand of "consultation chess" where the partnership is between man and machine. The human player would use the program to do extensive and tricky forward analyses of variations selected by his own chess knowledge and intuition~ and to check out proposed lines of play for hidden flaws. In this way the worth of the "brute force" component, which might perhaps be estimated as lying somewhere in the 500-1000 interval, could actually be measured on the USCF scale. A Wager In 1968 John McCarthy, Seymour Papert and I combined to make a bet with a young computer scientist, David Levy, now an international chess master. We wagered £ 1000 that he would be beaten by a chess program by the year 1978. The former world champion M. M. Botvinnik has told Levy, "I feel very sorry for your money," but M. Euwe, also an ex-world champion, thinks otherwise. Levy's own comment is "Only time can tell". 0 COMPUTERS and AUTOMATION for January. 1973 The Frenchman Who Was to Kill Kennedy Phillippe Bernert Camille Gilles L 'Aurore, October 2, 1972 Paris France translated by Ann K. Bradley Computers and Automation and People The extraordinary confession revealed in an exclusive interview to Camille Gilles by a veteran officer of the 1st REP, ex-chief of the Delta Commandos of the O.A.S., who is now raising livestock in South America. On May 31, 1961, from the top of an apartment building in the Rue de Rivoli or the Champs-Elysees, ex-lieutenant Romero of the O.A.S. was supposed to shoot down President Kennedy while pretending to aim at General de Gaulle. The attempt would have been called a tragic error, due entirely to internal French problems. And no one would have dreamed of looking for the real instigators of the plot: Americans. "Armed with a rifle with an infra-red sight, I was supposed to miss General de Gaulle and kill President Kennedy. This, precisely, onMay 31, 1961, during Kennedy's official visit to France. The attempt was to take place on the Rue de Rivoli or, preferably, on the Champs-Elysees. I really didn't need the infrared sight -- I was considered one of the best sharpshooters in the French army." The man who just made this fantastic revelation, a revelation capable of turning a whole page of contemporary history upside down, of calling into question the famous Warren Report and breaking wide open the investigation into into a plot against Kennedy at the time of the Dallas assassination this man's name is Jose Luis Romero. Nine years after Kennedy's assassination, Romero has decided to talk. Leaving his hacienda somewhere in South America, he made a quick trip to Paris to sign an exclusive contract with Marcel Julian, P.O. P.O.-G. of PIon and Julliard, publishers. This took place last Saturday afternoon. In PIon's summer garden -- they are the editors of General de Gaulle's "Memoi rs" -- thi s veteran ki ller of the Delta commandos during the war in Algeria began to dictate his extraordinary confession to my colleague Camille Gilles, well-known reporter of pied noir origin and chronicler of the Algerian drama in hi s novel oil sont les roses de Fouka? (Where are the roses of Fouka?) COMPUTERS and AUTOMAnON for January. 1973 It was while working on his new book about the dozen veteran killers who regrouped, in the heart of the O.A.S., around the celebrated Jesus de Babel-Oued ("Jesus and his apostles") that Camille Gilles established contact with Jose Luis Romero and uncovered the story of an earlier secret plot against Kennedy. At the heart of the affair was Romero: a big fellow over 6'1", with intensely black eyes, his body covered with tattoos and with scars from the splinters of a mine that exploded in Indochina. A colossal man whose hair, today, is entirely white. "Late in 1963, several weeks after I learned of the murder of Kennedy in Dallas, I woke up one morning with my hair like this. My moustache was white, and all the hair on my body had turned White." But this is the same man who, two and a half years earlier, had agreed to kill Kennedy "for the money and the adventure". He was offered two hundred million old francs. But who is Romero? Born in Madrid ill 1926, son of a revolutionary hunted by Franco's forces, he sought refuge with his family in France, spent two years in a refugee camp at Argeles, near Perpignan, and then joined the underground resistance with his father, who was a leader in the F.T.P. Following 37 that he left France for Oran where his father, a shoemaker, started to produce espadrilles. When he was twenty, Jose Luis joined the French Foreign Legion and fought in Indochina, then in Algeria. After serving in the 2nd B.E.P. he became one of the best officers in the 1st B.E.P. under Dufour, Sergent, Denoix de Saint-Marc. He found himself among those responsible for keeping the Casbah under control. It was around 1958 that Lt. Romero became friends with a counselor at the American consulate in Algiers, a friendship founded on confidence and mutual esteem. Mysterious Mike The American, whom we shall call Mike from his code name, worked visibly for certain U.S. secret service organizations. But at the same time he showed himself to be very sympathetic toward elements in the French Army that wanted a French Algeria. He even said one day to Jose Luis (whom he called "Gt::orge"): "I know certain U.S. financiers who wouldn't be unhappy to put their money into Algeria. But in a French Algeria or, at least, an independent Algeria that was dominated by European interests." A Strange Contract "I didn't have any reason to be suspicious of Mike's friends, so I agreed. A little later, after they stopped the car in the forest of Sidi Ferruch, the spokesman for the two proposed the following "contract" to me. On May 31, President Kennedy would be in Paris on an official visit. I was supposed to fake an attempt on the life of General de Gaulle (an almost classic phenomenon at present: insurrection in Algeria, trial of Generals Challe and Zeller in Paris, etc.) and to "accidentally" kill Kennedy, at the moment when he would be next to the President of the French Republic." "My interlocutors knew exactly who they were talking to. They seemed to know my record as a sharpshooter, that I hit the bullseye 98 times out of 100. They offered me $400,000 -- half right away, the rest once the thing was over." " -- But you have to make up your mind now. Drop everything and come with us." In brief, like Lt. Romero, Mike showed himself to be violently anti-Gaullist and anti-communist. And when part of the Army revolted and formed the O.A.S., Mike kept up hi s contacts wi th Romero and provided him with information, false passports, money, arms, and explosives. "I accepted. They took me immediately to the little port of Bou-Haroun, near Castiglione. There they gave me a Swi ss passport in the name of Broeger, issued April 20, 1961 by the Canton of Geneva. Then they put me on a French trawler that sailed that night. The sea was rough and I suffered down in the hold on my air mattress. The whole night the boat resounded with hammer blows. The next morning we reached the small Spanish port of Andraix di Porto." At this time Romero, who had organized the Delta commandos, had shed his uniform and was strictly a clandestine operator, going around in cotton knit shirts, light chinos and string sole shoes, shoes all the Delta commandos wore because they were ideal for running and for scaling walls without slipping and falling. "Curiously, the trawler was no longer French ~ut was flying the Spanish flag, with a Spanish maritime registry number. A Seat, a Spanish-made car, was waiting for us on the quay. We drove for three long hours, but it seemed more like centuries to me. Afterwards I found out that the villa they were taking me to was actually only twelve miles from Andraix." This is what he was wearing one evening in May, 1961, on his way to a meeting his friend Mike had arranged with him at a Vietnamese restaurant in Algiers, the Madrague, not far from the sea. Everything started that night. Here is how Romero told it Saturday to the man writing this incredible history, the journalist Camille Gilles: "At the villa I was able to shower, shave and change clothes. I found a shirt, suit and a pair of shoes, all in my size, but there was nothing in any of them to show where they came from. I also saw my friend Mike again there, but it was for the last time. The diplomat who had helped us so much in Algeria greeted me effusively." "Mike was supposed to bring me some false passports so that some of our men could rejoin Capt. Sergent, chief of the O.A.S., i,n continental France. I left my two bodyguards standing outside the restaurant, in front of the door, and slipped my Luger under my bath towel that I'd left lying on a chair beside me." "A few minutes later two men came in and, without hesitating a second, walked over to me and sat down ,at my table. With their typical walk, as if they were afraid of breakini eggs, and their black hats with the wide ribbon, they had to be Yankees. They came, they told me, from Mike. "First of all they gave me the passports Mike had promised me, as well as a plain envelope filled with bank notes. They said it was for the O.A.S. We had dinner together. Then t after we had finished t the bigger one, the one who did the most talking (the other seemed content with monosyllables) suddenly said to me: "I want to talk to you seriously. I want you to get rid of those two gori lIas that are wai ting for you outside and then we'll go for a ride so I can explain to you what I have in mind." 38 " -- I knew you'd come I" he said. "Mike completed my transformation into a Swiss citizen by giving me a Swiss driver's license in the name of Broeger, a membership card to a private club in Geneva, and the number of my bank account in Lausanne where $100,000 in West German marks had already been deposited in my name. It had been agreed that my pay would be entirely in marks." "And for a start," Mike announced, "We are going to give you your first $100,000 right now, for your trip." Prelude to Dallas "They gave me a belt that I put on, with the Deutsch marks in slits on the inside. First I went to Geneva, where a car was waiting that took me to Lausanne. The second half of the funds had already been deposited in my account there. I withdrew the money and was careful to redeposit it in a new account. The evening of May 30, I was in Paris." "I immediately took a cab to a cafe in the ChampsElysees, 'Le Paris'. There a contact gave me a plan COMPUTERS and AUTOMATION for January. 1973 that I still have -- in a safe place. The plan offered me three alternatives. The first was to fire on Kennedy from the top of an apartment house on the Rue de Rivoli, along the route the presidential motorcade was to take. It gave the addresses of two apartments, along with the names of their occupants both of them old people living alone, who could be locked up in another room while I was taking care of things at the front window." give my employers the slip at this point in the game? The best way, I figured, was just to pretend I was still going through with the whole thing. So I caught the subway at the George-V station and got off at the Gare du Nord. There I went up to the woman selling papers and asked her loudly where the toilets were." "The second possibi li ty was to try to shoot Kennedy from one side of the Place de l'Etoile, just as the two presidents were getting out of their car to approach the tomb of the Unknown Soldier. Here again, an apartment had been selected that was on the next to the last floor and had windows that were well located for our purposes. This was the same tactic Oswald used two years later in Dallas "To get my contact, as well as the men following me, to wait for me by the newsstand, I went off in the direction of the toilets. But since I knew the station like the back of my hand, I slipped out as soon as I could and then ran what must have been a record hundred meters. Then, figuring I'd given everyone the slip, Iwent back to the Porte d'Italie. I didn't even try to stop at the hotel. With my belt still stuffed with Deutschmarks, I hitched to Nice. My Swiss passport got me into Italy and from there I went on to Lausanne." "The gun I was supposed to use, a Remington carbine 280 wi th an infrared sight, was in a small trunk in the baggage room at the Gare du Nord. To get the key to the trunk, I had to go to the Lost and Found at the station and stand near a particular newsstand, where a man would give it to me." "It was up to me to choose the place where I wanted to shoot, but either way my contacts promised me a safe escape -- cars would be waiting near each of the si tes to make sure I got away wi thout a trace." "I don't know why, but on my way to my hotel in the Champs-Elysees, to think things over, I suddenly felt very uneasy. All at once it hit me what a really shrewd plan my employers had come up with. The "accidental" murder of Kennedy was to be blamed on the O.A.S. which, they would say, had decided to kill de Gaulle but failed. A nice, neat 'secret plot' story that would cover their own trail perfectly." "I said to myself that this small group of Americans had chosen me not just for my strong anti-Gaullist feelings, but also so that, if I were ever captured, people would think I was a li ttle "cracked". I had to have a trepaning operation in Indochina after I was wounded in a mine explosion. So, if I started talking in front of police and judges about a U.S. plot against Kennedy, they would simply fig~ ure I didn't know what I was talking about." Algiers Intervenes "And then, almost as if I'd foreseen Oswald's fate -- to be killed only 24 hours after shooting Kennedy in Dallas -- I told myself 'This is too big. They'll never let you live after you finish the job; they'll have to get rid of you.' Anyway. I was worried enough to ask my commanding officers in the O.A.S. for their advice." "As soon as I got back to the hotel I put in a call to Algiers. I told the O.A.S. staff there honestly what the situation was. My colonel said, 'I'll call you back in half an hour. Don't make a move until you hear from us.' Half an hour later the order came from Algiers. 'Don't touch this deal. Let the Americans take care of their own dirty business. The whole thing is likely to backfire on usl' I may be wrong, but I think that General Salan himself was consulted about it and that he was the one who made the final decision. The O.A.S. saved Kennedy's life that day." "My problems were just beginning though, because I'd felt I was being followed ever since I'd left the Vietnamese restaurant, "La Madrague", near Algiers -- guarded, but watched, too. How could I COMPUTERS and AUTOMATION for January, 1973 Stop "Once in Lausanne, instead of foolishly putting in a personal appearance at the bank, I asked to have my account transferred to another branch. There I had the bank change the marks in my account into dollars. Then, with my little bundle safely tu~ked away, I returned to Rome. Since I was still afraid of being followed by Mike's friends, I ended up enlisting with a group of mercenaries that were leaving for the Congo. No one was going to find me fighting in the Congo -- it was the ideal hiding place. After the Congo business was over, I hit the road for South America. With the money Mike had given me, the money that was supposed to pay for Kennedy's assassination, I finally set myself up there in a hacienda where I'm now happily rais-, ing bulls." "This whole story might sound crazy to you, of course. I know what it implies -- that from 1961 on there were men trying to eliminate Kennedy by means of a hired killer. Maybe the same men finally succeeded two years later in Dallas, with Oswald. Why did I wait so long to talk? Because my friends told me the time had come to explain some things, because my former commanding officers in the O.A.S. gave me the green light -- and because I decided when I met Camille Gilles that he was a journalist who deserved to write this story." "1 will no doubt be asked to prove what I'm telling you. The proof exists, and the men who contacted me know it. It's now safely in the hands of a lawyer in Geneva: letters I exchanged with 'Mike't the American diplomat; the three passports they gave me; the addresses of the Paris apartments that were supposed to be used; the names of the people living there; the actual written plans I got from the go-betweens, and the little official notebook they gave me that described in detail the schedule Kennedy was to follow." "I'm not talking for money. I'm rich and happy already. I spend my life on horseback, in the middle of my herds. I've had enough of adventure. But the moment of tr11th always arrives. There are certain things you can't keep to yourself forever ... " Saturday evening, ex-lieutenant Romero was back in South America. He is corresponding by means of tape recordings with his biographer, Camille Gilles, and his editor, Marcel Julian. Will we, thanks to the revelations of this solitary adventurer, finally be able to penetrate the darkness surrounding the death of Kennedy in Dallas? Was the attempt that misfired in Paris nothing but a dress rehearsal for the tragedy that shook the world? [] 39 Why I Distrust the Romero Story Robert P. Smith, Director of Research Committee to Investigate Assassinations ~927 15th St., N.W. Washington, D.C. 20005 As Director of Research for the Committee to Investigate Assassinations, I sit at the hub of a sort of wheel of information. Some may say, perhaps not without cause, that it is a wheel of misinformation. Certainly there are some rickety spokes to it, and it isn't always easy to keep from running off the road. After long practice, though, and after having read and heard a lot of stories, I think I may have acquired some skill in avoiding the more obvious ditches. I. F. Stone, now with the "New York Review" but whose "Newsletter" was rightly regarded as one of the best in the country for many years, is said to have called the efforts to solve the mysteries of President Kennedy's assassination a "swamp of paranoia". He may be partially right. But with all deference to psychoanalysis, I submit that the investigation of President Kennedy's assassination is a good deal more. It is, for one thing, a serious avocation for some very sincere and competent people who are trying to find out what really happened on November 22, 1963. Our Government has failed to explain it satisfactorily. Secondly, it is a challenge to a number of dedicated researchers and students of the factual details of the assassination. Some of them are professionals in their own fields, and they find this case, quite literally and for absolutely objective and non-neurotic reasons, to be more baffling than any Sherlock Holmes story ever written. I do not exaggerate. Those opinion leaders who believe this case is solved cannot have tried to grapple with the physical evidence of the case. Their persistence in pooh-poohing the problems of reconstructing the actual shooting, for example, reflects a kind of paranoid gullibility of their own. Thirdly, and unfortunately, pursuit of the facts behind the JFK assassination tends to be an abode for a certain number of jokers and opportunists who are out to make a buck by exploiting the gullible. With these I have lost all patience. They interfere with the serious things that need to be done, and they bring ridicule on the genuine efforts at understanding. In regard to the killing of President John F. Kennedy, it is an unpleasant but very real fact that one can find in the National Archives many scores of reports about people who said they wanted to kill the President, or who expected someone to do it, or who claimed they knew someone who actually planned to do it. I have read a great many of these reports. The motives, or implied motives, are allover the political spectrum. Moreover, some of the stories were on record before the assassination and were every bit as plausible, from any standpoint, as the Romero story. So why should we believe Romero, whose story didn't come to light until nine years after the JFK assassination and eleven years after the plot it40 self? He says he was afraid, which may account for him, but the question is, why should we believe? There are curious details in Romero's story that make no sense to me: Item 1: Why an "infra-red sight" on the rifle when the assassination is to take place in broad daylight? Item 2: Why did Romero, while going to what he expected was merely a rendezvous with his "friend" Mike, take along two bodyguards? Item 3: Why later, at the restaurant, but still before he knows that anyone besides Mike is coming, does he place his Luger under a towel on the next chair? Item 4: How can he be a "sharpshooter for ting 98 bull's-eyes out of a hundred", nothing said about the distance of the get or any of the other details needed attach significance to such a figure? hitwith tarto Item 5: Why couldn't Romero have been given the key to the trunk (containing the special rifle) in advance, instead of using another man to give him the key, with the added and unnecessary risks that this implies? (After all, they had already given him the money and other papers.) These dubious details, of which many other examples could be cited, sound more like melodrama than reali sm. There is more to this story -- not Romero's, but the story about Romero's story. Not all of it is yet known to me, but I do know that CBS, which is certainly a large and competent news organization with offices in Paris, spent a fair amount of time and money checking it out. Actually, they were drawn into it by a later embellishment in which Romero purportedly identified two of the "Watergate Five" as being the two Americans who approached him in 1961. This added sensation involved some intermediaries who, I am convinced, were entirely sincere in their beliefs. But the end result of all this effort was a flat zero. The news organization concluded that the whole business was a hoax. I had previously come to the same belief for the reasons I have stated above. Does this imply that the CBS investigation was CIA-controlled, and that the CIA influenced it to arrive at this conclusion? The answer is that I don't know. I haven't any evidence either way. But why should I impugn the integrity of a large organization involving many people, in effect assuming that they were Q!l CIA influenced, in favor of believing the story of one man who has no corroboration from anybody and who keeps his supposed evidence locked up in a vault somewhere? Particularly I cannot believe him when his story fails to hang together and when I know at least a half-dozen similar kinds of story (contradictory to Romero's, however) which are just as "plausible" as his. Finally, I ought to make one other point that may appeal to those who insist on reasoning from motives. I do believe that Romero was (and is) part of a conspiracy. Cui bono? Yes, a good question and here's my answer: The conspiracy was one to sell books I 0 COMPUTERS and AUTOMAliON for January. 1973 ACROSS THE EDITOR'S DESK Computing and Data Processing Ne,wsletter Table of Contents APPLICATIONS Computerized Feed Mixing Begins at Gooch Mill Minicomputers Deliver Daily Newspapers in Fort Worth, Texas NEW PRODUCTS 41 41 EDUCATION NEWS . New Prison Arrival Sparks Computer Programming Studies General Turtle, Inc. ~ A Small Company With a Strange Name Nova Computer Becomes Teacher's Aid in New Singer Driver Training System Computer Program Helps in Treatment of Heart Patients Risk of Analysis Program Announced by McDouglas Corp . 43 43 43 42 42 MISCELLANEOUS SDA Information Sciences, Inc., Elects President and Chairman of the Board 45 APPLICATIONS mill such as Gooch, which can produce 700 tons, or 1,400,000 pounds of feed a day. COMPUTERIZED FEED MIXING BEGINS AT GOOCH MILL MINICOMPUTERS DELIVER DAILY NEWSPAPERS IN FORT WORTH, TEXAS Mervin Eighmy, Gen. Manager Millard Farmer, DP Manager Gooch Feed Mill Corp. Lincoln, Nebr. Gooch Feed Mill Corp. has begun using a small computer to control the measuring-in of ingredients for its animal feeds. Until now the process of compounding numerous ingredients has been largely manually controlled. The System/7 computer, using predetermined feed formulas stored in its memory, calls out the precise amount of each of up to 20 ingredients for any of 20 different feed mixes. The feed formula itself is determined by another IBM computer based on the nutrient requirement of the particular animal to be fed, also taking into account the unit cost of each ingredieni. The feed is mixed in three-and-one-half ton mixers. Because there is such wide variation between the amounts of the several ingredients needed, a blend may call for a quantity weighing as little as an ounce and as much as a ton or more. When a particular kind of feed is called for, an operator merely enters the feed number into the computer. The computer automatically begins selecting ingredients stored in any of 50 bins. The System/7 transmits a signal to the selected bin, which sets in motion an auger. The auger starts pulling out the selected ingredient into an enclosed chute which empties on to a scale. As the ingredient hits the scale, the computer begins measuring the weight, shutting off the auger when the precise weight has been reached. If when selecting the desired bin -- say of soybean meal -- it is empty, the computer signals the operator that is should be refilled, and goes on to the next soybean meal bin for its needs. This ensures that the mixing process will not be interrupted as long as the needed ingredient is available in any bin to which the computer has access. Besides more accurate feed mixes, there is better control of inventory. For the first time Gooch Mill can track the precise amount of each ingredient from the time it arrives at the mill until it leaves in the completed blend. This is a major factor for a COMPUTERS and AUTOMATION for January. 1973 A. T. Le Ance Computer Automation, Inc. 18651 Von Karman Irvine, Calif. 92664 In Fort Worth, Texas, a minicomputer is the heart of a new Automated Newspaper Delivery System (ANDS). The ANDS (developed and produced by AVCON, Inc., of Fort Worth) is a self-contained, on-board system which guides a delivery truck along a complex route and tells two men on either side of a specially designed vehicle, when to throw their papers. Accordingto the AVCON people, they never miss. The system continuously measures the vehicle's location in relation to a pre-planned route, then issues audio and visual instructions which guide the driver and the paper throwers on their appointed rounds. It even activates the vehicle's turn signals shortly before it is scheduled to make a turn, giving the driver added warning of the impending maneuver. In addition, the ANDS detects driver errors and immediately prescribes appropriate corrective actions. Because of the system's unique guidance capabilities, neither the driver nor the throwers need maps, subscriber lists, or prior knowledge of the route. It is all done by tape and computer memory. First, a fixed route is divided into segments and a "signature" for each segment is recorded by driving over the segment with the AVCON system operating in its mapping mode. Locations of delivery points are recorded in terms of their distance from the beginning point, when the driver or an assistant depresses a switch at each location. For basic route control, verbal instructions are recorded on audio tape. To travel over a previously mapped route, the driver simply starts the route at a specified point and follows the system's real-time audio and visual commands. The paper throwers mounted by open windows on either side of the van wear earphones that receive the signals telling them when to hurl their rolledup papers. Lead times for the throwers are auto41 matically adjusted to the speed of the truck, which may be traveling anywhere from 15 to 30 miles an hour along its routes. have amounted to over $700,000 in four years, even after deducting wages of 50 cents per day paid to inmates and the costs of keeping a man in prison. The system hardware is mounted above the truck's windshield, except for a digital display console which is mounted atop the dashboard in front of the driver and provides visual instructions. The ANDS includes a miniature NAKED MINI 16 digital processing and logic unit (built by Computer Automation, Inc., Irvine, Calif.), a tape cartridge drive, proprietary sensing devices, control/display console with message printer, and a variety of annunciator and actuator devices. Before installation of the Honeywell Model 55 none of the inmates had seen a computer. They wrote their programs and keypunched them on cards or coded them with a Honeywell Key tape (provided by the state Department of Education) onto magnetic computer tape. The card decks and tapes were picked up twice a week, transported to a "client" computer si te where the programs were run. The results were returned to the inmates later for corrections. Having their own computer will enable inmates to work on program devel-opment and to tryout their ideas while they are fresh. There will be greater continuity between each phase of development, -- and the Walpole programmers will be able to supply their clients with finished products. EDUCATION NEWS NEW PRISON ARRIVAL SPARKS COMPUTER PROGRAMMING STUDIES Honeywell Inc. 60 Walnut St. Wellesley, Mass. 02181 A new "inmate" has been welcomed to Massachusetts maximum security prison at Walpole, Mass. The new resident of the prison is a computer to be used by prisoners who study computer programming. The computer, formerly in Honeywell's custody, is being loaned permanently to the inmates. For the past five years, volunteers from the company have been teaching programming courses to a group of inmates at the Massachusetts Correctional Institution (MCI) in Walpole in response to an inmate-initiated request for courses in computer programming. The career-training program has paid off in both professional accomplishment and an extremely low recidivism rate for those in the group who have been paroled -- only 4 1/2 per cent compared to a national rate of 68 per cent. Malcolm D. Smith, a professional teacher and programmer who was then a Honeywell staff adviser in programming systems, was in charge of setting up the program, which he designed to be self-perpetuating. When students complete their first course, they teach what they have learned to a new class, at the same time beginning the second phase of their own program. Students in the first phase of the program work at other prison jobs during the morning and attend classes in the afternoon. Those who successfully complete the courses join the group of 12 men who are fUll-time programmers. The Walpole programmers have complete responsibility for conducting classes for students in the first phase of the program, as well as for the professional programming work done for the state and municipalities. They also attend advanced classes conducted by Honeywell instructors. According to Smith, now manager of Honeywell's Conversion Technology Center and still head of the Honeywell group, "The Walpole instructors have been extremely meticulous in their teaching. The way they have handled their teaching and programming responsibilities shows they are very competent professionals." In addition to these significant personal accomplishments, the Walpole programmers have been doing professional programming for the state departments of Education, Natural Resources, and Corporations and Taxation, and for several cities and towns in Massachusetts. Estimated savings to thei r "clients" 42 The computer also will permit expansion of the program to include computer maintenance and operator training courses. Instructors from HoneywelPs Field Engineering Division have begun teaching a group of six inmates the computer maintenance courses. This program also will be self-perpetuating. Operator training courses will be conducted by the Walpole programmers. This course will be aimed at men who do not have enough prison time left to complete programming courses or who are more interested in computer operation than programming. GENERAL TURTLE, INC. - A SMALL COMPANY WITH A STRANGE NAME General Turtle, Inc. 545 Technology Square Cambridge, Mass. 02139 A new educational technology has recently become available from General Turtle Inc. -- a small company with a strange name. General Turtle Inc. has been formed in response to requests from schools and research groups for computer-controlled devices similar to those used in the program of Research on Education conducted by the "LOGO GROUP" of MIT Artificial Intelligence Laboratory. The set of devices, developed by the new company, is designed to be compatible with the financial, technical and computational resources typically available in schools which already are using a minicomputer or telephone connections to a time-shared service The devices have, however, been designed to serve even better where more computational resources are available -- so that when computer resources grow, these devices will not become obsolete but will also grow in power. By means of General Turtle's devices, schools can extend the range of programming projects to include generating music, graphics, controlling cybernetic turtles, and more. The new applications reach more students and also deepen the intellectual content of the computer experience. They appeal to "mathephobic" children who find traditional programming "too mathematical" as well as to "math buffs" who want something involving more hard core mathematics. The recommended starter mini-system includes the following components: turtle with touch sensors; plotter; music generator; a components kit of motors. relays and sensors, and a controller to connect the precending devices to a freestanding or remote computer. COMPUTERS and AUTOMATION for January. 1973 The simplest mode of operation of the mini-system requires no expertise in hardware or systems software and no changes to the operating system or language already in use. Other modes of operation require small changes to the system software. General Turtle will design configurations to meet individual needs, plans, and budgets. NEW PRODUCTS COMPUTER PROGRAM HELPS IN TREATMENT OF HEART PATIENTS Robert A. Morris Manager of Information IBM Corporation Data Processing Division 1133 Westchester Ave. White Plains, N. Y. 10604 Cardiologists can interpret large volumes of electrocardiograms -- used in identifying heart disorders -- faster and more easily with a new computer program recently announced by IBM Corporation, White Plains, N.Y. Using the IBM Health Care Support Electrocardiogram (ECG) Analysis program, cardiologists can significantly reduce the time it normally takes to analyze ECGs (recordi ngs of the heart's electrical impulses). They can then speed their interpretations to attending physicians for use in dingnosis and treatment of heart patients. When the new ECG Analysis program, an IBM System/370 or System/360 processes -- in less than a minute -- the ECG readings which have been recorded in digital form on magnetic tape. The computer produces a printed report containing interpretative statements about the condition of the patient's heart. Cardiologists can quickly validate the statements by comparing the printed report with the strip chart recording, which are then sent to the patient's doctor. The Health Care Support Electrocardiogram (ECG) Analysis program is scheduled to be available in February 1973, at a monthly charge of $350. RISK ANALYSIS PROGRAM ANNOUNCED BY MCDONNELL DOUGLAS CORP. McDonnell Douglas Corp. Box 516 St. Louis, Mo. 63166 The construction business, like a poker game, involves a great many risks. Poker is less a gamble, though, when the odds are known and the hands played accordingly. To help take some of the gamble out of the construction business, McDonnell Douglas Automation Company is marketing and processing a computerized risk analysis program developed by Decision Sciences Corporation, St. Louis. Called Contractor's Early Warning System (CEWS), the program helps reduce the risk involved in construction cost bidding by alerting a contractor to a possible cost overrun soon enough to allow him to adjust his bid. Using McDonnell Douglas's IBM Model 195 computers, 5000 simulations can be performed in less than one COMPUTERS and AUTOMATION for January, 1973 ~ I minute. A wide variety of conditions, including labor strikes and weather, can be considered to determine the possible effects on the contractor's potential profit on a project. The contractor need have no knowledge of statistical variations and standard deviations. He simply identifies those cost items which can vary by more than one per cent of the total anticipated profit. The program produces eight management reports which may be used to examine company risks involved in making a bid. CEWS is available exclusively through a processing or licensing agreement from McDonnell Douglas Automation Company, a division of McDonnell Douglas Corporation. NOVA COMPUTER BECOMES TEACHER'S AID IN NEW SINGER DRIVER TRAINING SYSTEM Data General Corp. Routes 9 and 495 Southboro, Mass. 01772 From the time Janet Austin began her acrosstown drive to the moment she backed into a parking space and turned the engine off, everything she did was meticulously noted and recorded by a small Nova computer, made by Data General Corporation of Southboro, Mass. Janet was one of a group of high school students "dri vi ng" a new LinkGJ Model L-210 simulator, a streamlined driver training device that looks like the driver's section of a new car. It has dashboard instruments, steering wheel, gear selector, and driver's seat. The trainer is made by The Singer Company's Simulation Products Division, Binghampton, N.Y. The Nova, mounted in a small cabinet under the instructor's control console, lets the instructor monitor the actions of an entire group, part of a group, or an individual. The instructor can select percentage levels of achievement at the console, and the Nova indicates which students fall below that level. Students "drive" on a realistic motion picture roadway projected on a screen at the front of the room. A binary code track on the film triggers the Nova, which starts all the automatic functions of the system, and monitors student responses to various driving situations. Some of the automatic functions handled by the Nova are: • checking student responses to filmed situations • displaying results on the instructor's console • indicating when group performance needs improvement Student errors are classified in five categories acceleration, speed, braking, steering, and signal. When a student makes a mistake, an indicator in the simulator lights, and stays on until the student takes corrective action. The Nova keeps a running check on the number of checks in each of the five categories and the number of errors for each student in each category. When a class is over, the instructor can determine such information as total checks by category, total errors for each student in each category, and the student's score. An optional package lets the instructor accumulate student performance over a period of time. In addition, the instructor can override the computer and make unprogrammed checks into the system. (please turn to page 45) 43 NEW CONTRACTS Sanders Associates, Inc., Nashua, N.H. Lockheed-California Co. Burroughs Corp., Detroit, Mich. National Life and Accident Insurance Co., Nashville, Tenn. Swedish State Power Board, Stockholm, Sweden TRW Inc., Cleveland, Ohio Computer Sciences Corp., Los Angeles, Calif. Strategic Air Command (SAC), Omaha, Neb. Sperry Univac Div., Sperry Rand Corp., Blue Bell, Pa. South African Coal, Oil and Gas Corp. (SASOL), Sasolburg, Orange Free State, South Africa Safeguard Communications Agency (SAFCA), Grand Forks, N. Dak. Catalina and Cole of California , Inc. , di v. of Kayser-Roth United States Postal Service Honeywell, Inc., Tampa, Fla. TBS Computer Centers Corp. (NASDAQ: TBSC) , New York, N.Y. National Cash Register Co., Postal Systems Division, Dayton, Ohio Intermetrics Inc., Cambridge, Mass. North American Rockwell (NR) Space Div., Downey, Calif. Autonetics Div., North American Rockwell Corp. (NR), Anaheim, Calif • SYSTEMS Engineering Laboratories, Inc., Fort Lauderdale, Fla. Varian Data Machines, Irvine, Calif. U.S. Department of Transportation NASA's Manned Spacecraft Center, Houston, Texas State Bank of Czechoslovakia, Prague and Bratislava, Czechoslovakia Honeywell, Inc. Wellesley Hills, Mass. Australian National Line, Melbourne, Australia SYSTEMS Engineering Laboratories, Inc., Fort Lauderdale, Fla. National Severe Storms Laboratory (NSSL), Norman, Okla. Optical Scanning Corp., Newtown, Pa. U.S. Navy Bunker Ramo Corp., Westlake Village, Calif. Computer Audit Systems, Inc., East Orange, N.J. Colonial Pipeline Co., Atlanta, Ga. U.S. Comptroller of Currency Auerbach Associates, Inc., Philadelphia, Pa. u.S. Department of Commerce, National Bureau of Standards, Fire Technology Div. Bunker Ramo Corp., Electronics Systems Div., Westlake Village, Calif. Computer Sciences Corp., Los Angeles, Calif. McDonnell Douglas Automation Co., Long Beach and Torrance, Calif. National Can Corp., Chicago, Quantum Science Corp., Palo Alto, Calif. State of Israel 44 Ill. Long lead preparation and startup costs on second production lot (Lot IV) of accoustic data processors for Navy's new S-3A carri er-based anti -submari ne warfare a ircra ft Electronic terminal computers and other equipment for use in nationwide communications system A Totally Integrated Data System (TIDAS) for electrical power production and power system control; TRW's role includes integration of total system, and design and fabrication of central data processing system; ASEA is prime contractor for the $15.5 million proj ect Serving as prime contractor for the integration phase of the 436M program at SAC's Omaha headquarters; includes supply of all equipment, computer programs and engineering services A UNIVAC 1106 system to be used for linear programming, production statistics and other general office and general accounting applications An automated communications circuit-monitoring system $6 million (approximate) 3-year renewal of original contract pro .. viding various data processing services A number of service test models of the Postal Service's advanced facer/canceler machine for high-speed automatic processing of letter mail A high-level computer programming language, designated HAL, tailored specifically for Space Shuttle's flight computers Studying and defining an air traffic management system for the 1985 and beyond time period Dual SYSTEMS 86 computers to be used as part of dedicated hybrid digital/analog complex for agency's space shuttle program Multiple Varian 620/L-IOO minicomputers, multiplexers, controllers, adapters and other devices for use in eight bank data acquisition and communications systems A Honeywell Series 2000 computer system to control ANL's central booking office for its passenger ships, to rationalize internal supply and purchase accounting systems, and monitor container movements in Austral1lsia SYSTEMS 86 computer for research methods program related to weather predicition and storm notification throughout the central United States. Thirty OpScan 17 Optical Scanning systems for use at Naval Air Training stations to process pilot evaluation forms A major expansion to the dual BR-340 computer system. Installing a customized version of Computer Audit Retrieval System (CARS 2) to help agency achieve a unified program for national bank examinations Designing National Fire Loss Data System (NFLDS) to serve as central source of data concerning fire losses, fatalities, and injuries in U.S. Development of a factory data entry system to be installed initially at DAC's Long Beach and Torrance facilities Development of a nationwide on-line information system linking more than 40 manufacturing plants with a central computer facility at NCC's headquarters A study of Israel's data communications requirements through the mid 1980's -- recommendations on services to be offered, technologies to be used, tariff policies for communication network $1.5+ million $4.5 million $3 million (approximate) $2.1 million $1.8 million (approximate) $1.7 million $1.3+ million $1 million (approximate) $948,171 $925,000 (approximate) $810,000+ $750,000 $362,000 (approximate) $250,000 (approximate) $175,000+ $67,000 COMPUTERS and AUTOMATION for January. 1973 NEW INSTALLATIONS Cyber 70 Model 73 system Philco-Ford Corp., Houston, Texas (2 systems) DECsystem-l055 Plessey Telecommunications, Liverpool, England IBM System/3 Braille Institute of America, Inc., Los Angeles, Calif. IBM System/7 Cook County, Chicago, Ill. IBM 360 system Florida Software Services, Orlando, Fla. Present Co., Inc., Rochester, N.Y. Wilmorite, Inc., Rochester, N.Y. NCR Century 50 system NCR Century 101 system UNIVAC 1106 system Rochester Germicide Co., Rochester, N.Y. Fisher-Price, East Aurora, N.Y. State Universi~y of New York (SUNY), Buffalo, N.Y. UNIVAC 9200 system UNIVAC 9200-11 system UNIVAC 9211 system Xerox Sigma 3 system Xerox Sigma 5 systems City of Santa Fe, Santa Fe, New Mexico Mr. Insurance, Smyrna, Ga. Chiltonian Limited, London, England Mahoning Valley Joint Vocational School, Canfield, Ohio Air Combat Maneuvering Range (ACMR), Marine Air Station, Yuma, Ariz. New inventory control system Payrolls, accounts payable, and job costing for firm and two other associated companies Managing invoicing system Order entry and order status systems, on-line inquiry for credit and collections, a complete assortment of sales and marketing statistical reports and summaries (system valued at $1.3 million) Added capacity permitting improved administrative computer services; replaces older computer equipment Payroll, general accounting, paving assessments, criminal statistics, and a system for municipality's "Model Cities" program Policy accounting and statistical reports Sales ledger, sales analysis, stock control and payroll and an extended management information system; replaces tabulating equipment Training students for opportunities in data processing; future use includes administrative tasks Monitoring pilots' performance in Air Combat Maneuvering Range (ACMR) -- Sigma 3; Missile simulations and computing missile hits and misses -Sigma 5; computing spatial position and interaircraft parameters -- 2nd Sigma 5; and 3rd Sigma 5 will control the other computers as well as two interactive display systems Frances Greenberg SDA Information Sciences, Inc. 1540 Broadwav New York, N. Y. 10036 SDA Information Sciences, Inc., a publicly held corporation with stock traded over the counter, conducts market research studies and surveys in many areas. These have included toiletries, drugs, foods, banking, packaging, advertising, household commodities, and airlines. It supplies interviewing nationwide; study questionnaire and sampling design; editing, coding, tabulation of data, and preparation of a final printed report with tables and analysis. At a recent meeting of the Board of Directors of SDA Information Sciences, Inc., Naomi J. Spinner was elected President and Chairman of the Board. She succeeds the late Robert E. Spinner. Prior to her election to these offices, Mrs. Spinner had been Treasurer of SDA as well as a member of the Board, and had served actively in the management and operation of the corporation. The corporation has a wholly-owned subsidiary, SDA Systems, Inc., a company which specializes in the solution of source data automation problems. This is done primarily through the manufacturing and marketing of a portable data collection device called the Porta-Station® Mrs. Spinner will also act as President of this subsidiary. Across the Editor's Desk - Continued from page 43 MISCELLANEOUS SDA INFORMATION SCIENCES, INC. ELECTS NAOMI J. SPINNER PRESIDENT AND CHAIRMAN OF THE BOARD COMPUTERS and AUTOMATION for January, 1973 ) Scientific data processing for the National Aeronautics and Space Administration (NASA); applications include data management of multiple data bases, data base maintenance, inter-processor communications with NASA's RTCC and processing of Earth Resources data Software development, testing and exchange interface integration before installation at international telephone exchange currently under construction in London "Talking Book" service which helps librarians gather and mail out tons of recorded books to the blind; system will eventually handle cassette tape recordings, Braille books and recorded periodicals Helping reduce air pollution; monitors pollution levels in county and spots dangerous pollution buildups for early corrective action Providing data processing services to clients 45 CALE,NDAR :OF C'OMING EVENTS Jan. 17-19, 1973: Hospital Information Systems Sharing Group, Information Science and the Health Care Institution seminar, Frontier Hotel, Las Vegas, Nev. / contact: Dean R. Cannon, P.O. Box 305, Bountiful, UT 84010 April 30-May 2, 1973: 1st Symposium on Computer Software Reliability, Americana Hotel, New York, N.Y. / contact: David Goldman, IEEE Hdqs., 345 E. 47th St., New York, NY 10017 Jan. 17-19, 1973: 1973 Winter Simulation Conference, San Francisco, Calif. / contact: Robert D. Dickey, Bank of California, 400 California St., San Francisco, CA 94120 May 3-4, 1973: 10th Annual National Information Retrieval Colloquium, Independence Mall Holiday Inn, 400 Arch St., Philadelphia, Pa. / contact: Martin Nussbaum, Computamation, 2955 Kensington Ave., Philadelphia, PA 19134 Jan. 31-Feb. 1, 1973: San Diego Biomedical Symposium, SheratonHarbor Island Hotel, San Diego, Calif. / contact: Dr. Robert H. Riffenburgh, Program Chmn., San Diego Biomedical Symposium P.O. Box 965, San Diego, CA 92112 May 13-16, 1973: 1973 International Systems Meeting, Hilton Hotel, Denver, Colo. / contact: R. B. McCaffrey, Association for Systems Management, 24587 Bagley Rd., Cleveland, OH 44138 Feb. 20-22, 1973: Computer Science Conference, Neil House, Columbus, Ohio / contact: Dr. Marshall Yovits, 101 Caldwell Lab., 2024 Neil Ave., Ohio State Univ., Columbus, OH 43210 Mar. 4-9, 1973: SHARE Meeting, Denver, Colo. / contact: D.M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, NY 10004 Mar. 7-8, 1973: 1973 Annual Spring Conference of the Association for Systems Management, Royal York Hotel, Toronto, Ontario / contact: Mr. R. H. Crawford, Comptroller's Department, Imperial Oil Limited, 825 Don Mills Rd., Don Mills, Ontario, Canada Mar. 9, and and P.O. 1973: 4th Annual AEDS Conference on the Development Evaluation of Educational Programs in Computer Science Data Processing, St. Louis, Mo. / contact: Ralph E. Lee, Box 951, Rolla, MO 65401 Mar. 7-9, 1973: 6th Annual Simulation Symposium, Tampa, Fla. / contact: Annual Simulation Symposium, P.O. Box 22573, Tampa, FL 33622 Mar. 12-14, 1973: A Programming Language (APL), Goddard Space Flight Center, Greenbelt, Md. / contact: Cyrus J. Creveling, Code 560, Goddard Space Flight Center, Greenbelt, MD 20771 Mar. 26-29, 1973: IEEE International Convention (lNTERCON), Coliseum & New York Hilton Hotel, New York, N.Y. / contact: J. H. Schumacher, IEEE, 345 E. 47th St., New York, NY 10017 Mar. 27-29, 1973: 1st Conference on Industrial Robot Technology, University of Nottingham, England / contact: Organising Secretary, CI RT, Dept. of Production Engineering and Production Management, University of Nottingham, Nottingham NG7 2RD, England Mar. 29-31, 1973: 10th Symposium on Biomathematics and Computer Science in the Life Sciences, Houston, Texas / contact: Office of the Dean, The University of Texas Graduate School of Biomedical Sciences at Houston, Division of Continuing Education, P.O. Box 20367, Houston, TX 77025 April 2-5, 1973: SOFTWARE ENGINEERING FOR TELECOMMUNICATION SWITCHING SYSTEMS, University of Essex, Essex, England / contact: Mrs. Penelope Paterson, Institution of Electrical Engineers Press Office, Savoy Place, London WC2R OBL, England April 10-12, 1973: Datafair 73, Nottingham University, Notting- h;!m. Fngland ! contact: John Fow!er & Partners Ltd., 6-8 Emeral St., London WCl N 30A, England April 10-13, 1973: PROLAMAT '73, Second International Conference on Programming Languages for Numerically Controlled Machine Tools, Budapest, Hungary / contact: I FIP Prolamat, '73, Budapest 112, P.O. Box 63, Hungary April 24-26, 1973: I.S.A. Joint Spring Conference, Stouffer's Riverfront Inn, St. Louis, Mo. / contact: William P. Lynes, c/o Durkin Equipment, 2384 Centerline Ind. Dr., St. Louis, MO 63122 46 May 14-17, 1973: Spring Joint Computer Conference, Convention Hall, Atlantic City, N.J. / contact: AFIPS Hdqs., 210 Summit Ave., Montvale, NJ 07645 June 4-6, 1973: 1973 8th PICA Conference, Radisson Hotel, Minneapolis, Minn. / contact: IEEE Hdqs., Tech. Svcs., 345 E. 47th St., New York, NY 10017 June 4-8, 1973: National Computer Conference and Exposition, Coliseum, New York, N.Y. / contact: AFIPS Hdqs., 210 Summit Ave., Montvale, NJ 07645 June 22-23, 1973: 11th Annual Computer Personnel Conference, Univ. of Maryland Conference Center, College Park, Md. / contact: Prof. A. W. Stalnaker, College of Industrial Management, Georgia Institute of Technology, Atlanta, GA 30332 June 26-28, 1973: Workshop of Computer Architecture, Universiti~ de Grenoble, Grenoble, France / contact: Grenoble Accueil, 9, Boulevard Jean-Pain, 38000, Grenoble, France June 26-29, 1973: DPMA 1973 International Data Processing Conference & Business Exposition, Conrad Hilton Hotel, Chicago, III. / contact: Richard H. Torp, DPMA International Hdqs., 505 Busse Highway, Park Ridge, I L July 20-22, 1973: 1973 International Conference of Computers in the Humanities, University of Minnesota, Minneapolis, Minn. / contact: Prof. Jay Leavitt, 114 Main Engineering Bldg., University of Minnesota, Minneapolis, MN 55455 July 23-27, 1973: 3rd Annual International Computer Exposition for Latin America, Maria Isabel-Sheraton Hotel, Mexico City, Mexico / contact: Seymour A. Robbins and Associates, 273 Merrison St., Box 566, Teaneck, NJ 07666 Aug. 13-17, 1973: SHARE Meeting, Miami Beach, Fla. / contact: D. M. Smith, SHARE, Inc., Suite 750, 25 Broadway, New York, NY 10004 Aug. 20-24, 1973: 3rd International Joint Conference on Artificial Intelligence, Stanford University, Stanford, Calif. / contact: Dr. Max B. Clowes, Laboratory of Experimental Psychology, University of Sussex, Brighton, Sussex BNl 90Y, England Aug. 27-29, 1973: ACM '73, Atlanta, Ga. / contact: Dr. Irwin E. Perlin, Georgia Institute of Technology, 225 North Ave., N.W., Atlanta, GA 30332 Aug. 30-Sept. 1, 1973: International Conference on Systems and Control, PSG College of Technology, Coimbatore, India / contact: Dr. R. Subbayyan, PSG College of Technology, Coimbatore 641004, Tamil Nadu, India Sept. 4-7, 1973: !ntcri1~t:onu! Computing Sympo:;:um 1973, Duvo:;, Switzerland / contact: Dr. H. Lipps, I nternational Computing Symposium 1973, c/o CERN, CH-1211 Geneva 23, Switzerland Oct. 2-4, 1973: 2nd International Computer-Aided Design and Computer-Aided Manufacturing Conf., Detroit Hilton Hotel, Detroit, Mich. / contact: Public Relations Dept., Society of Manufacturing Engineers, 20501 Ford Rd., Dearborn, MI 48128 Oct. 8-12, 1973: BUSINESS EQUIPMENT SHOW, Coliseum, New York, N.Y. / contact: Rudy Lang, Prestige Expositions, Inc., 60 East 42 St., New York, NY 10017 COMPUTERS and AUTOMATION for January, 1973 MONTHLY COMPUTER CENSUS Neil Macdonald Survey Editor COMPUTERS AND AUTOMATION The following is a summary made by COMPUTERS AND AUTOMATION of reports and estimates of the number of general purpose electronic digital computers manufactured and installed, or to be manufactured and on order. These figures are mailed to individual computer manufacturers from time to time for their information and review, and for any updating or comments they may care to provide. Please note the variation in dates and reliability of the information. Several important manufacturers refuse to give out, confirm, or comment on any figures. Our census seeks to include all digital computers manufactured anywhere. We invite all manufacturers located anywhere to submit information for this census. We invite all our readers to submit information that would help make these figures as accurate and complete as possible. The following abbreviations apply: (A) -- authoritative figures, derived essentially from information sent by the manufacturer directly to COMPUTERS AND AUTOMATION C figure is combined in a total (D) acknowledgment is given to DP Focus, Marlboro, Mass., for their help in estimating many of these figures E figure estimated by COMPUTERS AND AUTOMATION (N) manufacturer refuses to give any figures on number of installations or of orders, and refuses to comment in any way on those numbers stated here (R) -- figures derived all or in part from information released indirectly by the manufacturer, or from reports by other sources likely to be informed (S) sale only, and sale (not rental) price is stated X no longer in production information not obtained at press time Part I of the Monthly Computer Census contains reports for United States manufacturers. Part I I contains reports for manufacturers outside of the United States. The two parts are published in alternate months. SUMMARY AS OF DECEMBER 15, 1972 NAME OF MANUFACTURER Part 1. United States Manufacturers Adage, Inc. Brighton, Mass. (A) (11/72) Autonetics Anaheim, Calif. (R) (1/69) Bailey Meter Co. Wickliffe, Ohio (A) (6/72) Bunker-Ramo Corp. Westlake Village, Calif. (A) (12/72) Burroughs Detroit, Mich. (N) (12/72) Computer Automation, Inc. Newport, Calif. (A) (4/71) Consultronics, Inc. Garland, Texas (A) (12/72) Control Data Corp. Minneapolis, Minn. (R) (7/71) Data General Corp. Southboro, Mass. (A) (11/72) NAME OF COMPUTER AGT 10 Series AGT 100 Series 4/68 1/72 X 100-300 11/58 6/61 X X Metrotype Bailey 750 Bailey 755 Bailey 756 Bailey 855/15 Bailey 855/25 Bailey 855/50 BR-130 BR-133 BR-230 BR-300 BR-330 BR-340 BR-1018 BR-1018C 205 220 BlOO/B500 B2500 B3500 B5500 B5700 B6500 B6700 B7500 B8500 108/208/808 116/216/816 10/57 6/60 11/61 2/65 12/72 4/68 3/72 10/61 5/64 8/63 3/59 12/60 12/63 6/71 9/72 1/54 10/58 7/65 2/67 5/67 3/63 40-200 40-250 200-600 60-400 50-400 100-1000 100-1000 X DCT-132 NUMBER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. AVERAGE OR RANGE OF MJNTHLY RENTAL $(000) RECOMP II RECOMP III (S) (S) (S) (S) (S) (s) (S) (S) X X X X X 23.0 33.0 4/69 8/67 6/68 3/69 44.0 200.0 5.0 8.0 5/69 0.7 7/55 4/61 12/62 9/56 1/61 X X X X X 5/60 8/61 1/60 5/66 5/64 5/64 9/65 11/64 8/68 6/63 2/66 8/64 8/64 6/67 12/68 X X X 3.8 10-16 13.0 20-38 18.0 25.0 52.0 53.0 58.0 115.0 130.9 235.0 Nova Supernova Nova 1200 Nova 800 2/69 5/70 12/71 3/71 9.2 9.6 5.4 6.9 32 8 3 3 35 11 X 30 6 0 0 30 6 X X 8 37 7 15 0 16 0 160 79 15 18 19 19 0 15 0 12 0 0 0 8 52 7 27 0 16 0 0 0 0 2 2 0 12 3 X X X X X X 25-38 28-31 2.8-9.0 4.0 14.0 23.5 2/68 NUMBER OF UNFILLED ORDERS (S) X X GIS G20 LGP-2l LGP-30 RPC4000 636/136/046 Series 160/8090 Series 92l/924-A 1604/ A/B l700/SC 3100/3150 3200 3300 3400 3500 3600 3800 6200/6400/6500 6600 6700 7600 COMPUTERS and AUTOMATION for January. 1973 1 DATE OF FIRST INSTALLATION 52-57 45 65-74 1 4 1 (S) (S) 12 18 7 27-40 30-33 X X 64-49 62 72-81 117 190 8 4 60 13 5 110 225 1 165 215 10 20 1 175 235 35 65 100 295 20 165 322 75 29 610 29 59 425-475 83-110 55-60 205 15 15 40 20 108 85 5 8 (S) (S) (S) (S) X X X X X X X X 0 C C C C C C C C C C C Total: 160 E 920 200 2100 310 47 NMlli OF HANUFACTURER Data General (cont'd) Datacraft Corp. Ft. Lauderdale, Fla. (A) (11/72) Digiac Corp. Plainview, N. Y • (A) (5/72) Digi tal Computer Controls, Inc. Fairfield, N.J. (A) (11/72) Digital Equipment Corp. Haynard, Nass. (A) (5/72) Electronic Associates Inc. West Long Branch, N.J. (A) (11/72) EHR Computer Hinneapolis, Ninn. (A) (11/72) General Automation, Inc. Anaheim, Calif. (A) (8/72) General Electric West Lynn, Hass. (Process Control Computers) (A) (10/72) Hewlett Packard Cupertino, Calif. (A) (7/72) Honeywell Information Systems Wellesley Hills, Hass. (R) (6/72) 48 NAHE OF CO~1PUTER DATE OF FIRST INSTALLATION AVERAGE OR RANGE OF HONTHLY RENTAL $ (000) Nova 1210/1220 Nova 820 6024/1 6024/3 6024/5 Digiac 3060 Digiac 3080 Digiac 3080C D-112 D-116 2/72 4/72 5/69 2/70 12/71 1/70 12/64 10/67 8/70 1/72 4.2 ;5. 2 6.4 52-300 33-200 11-80 9.0 PDP-l PDP-4 PDP-5 PDP-6 PDP-7 PDP-8 PDP-8/1 PDP-8/S PDP-8/L PDP-8/E PDP-8/N PDP-8/F PDP-9 PDP-9L DECSystem-10 PDP-11/20 PDP-11R20 PDP-11/05 PDP-11/45 PDP-12 PDP-IS LINC-8 11/60 X X X X X X X X X 640 8400 PACER 100 EHR 6020 EHR 6040 EHR 6050 ENR 6070 EHR 6130 E}1R 6135 E}1R 6145 E}1R 6140 SPC-12 SPC-16 System 18/30 GE-PAC 3010 GE-PAC 4010 GE-PAC 4020 GE-PAC 4040 GE-PAC 4050 GE-PAC 4060 2114A, 2114B 2115A 2116A, 2116B, 2116C 2100A G58 G105A G105B G105RTS G115 Gl20 G130 G205 G210 G215 G225 G235 G245 G255 T/S G265 T/S G275 T/S G405 G410 T/S G415 G420 T/S G425 G430 T/S G435 G440 T/S G615 G625 G635 1I-110 H-115 H-120 H-125 H-200 H-400 H-800 H-1200 H-1250 8/62 9/63 10/64 11/64 4/65 3/68 9/66 11/68 5/72 12/66 11/68 12/67 9/69 2/61 9/66 4/67 7/67 7/72 4/65 7/65 2/66 10/66 8/67 1/68 5/70 7/69 5/70 10/70 2/67 8/64 12/66 6/65 10/68 11/67 11/66 3/71 5/70 6/69 6/69 7/69 4/66 3/69 12/68 6/64 7/60 9/63 4/61 4/64 11/68 10/67 10/65 11/68 2/68 11/69 5/64 6/67 6/64 6/69 9/65 7/69 3/68 4/65 5/65 8/68 6/70 1/66 12/67 3/64 12/61 12/60 2/66 7/68 NilllEER OF INSTALLATIONS Outside In In World U.S.A. U.S.A. (S) (S) (S) (S) (S) (S) X X 10.0 10.0 4.9 3.9 3.9 (S) (S) 0 13 0 100 30 48 40 90 2 50 X 5 10 45 100 23 100 1402 3127 918 3699 3787 365 2 436 40 243 2740 14 0 0 620 545 200 Total: 18456 170 29 30 16 6 17 15 47 41 X X X X X X X X (S) (S) (S) 17.0 (S) (S) (S) (S) 0 0 0 0 (S) X 1.2 12.0 1.0 5.4 6.6 9.0 15.0 5.0 2.6 7.2 2.0 6.0 6.0 X 7.0 X 0.25 0.41 0.6 0.5 1.0 1.3 1.4 1.2 2.2 2.9 4.5 X X X X X X X X X 6.8 1.0 7.3 23.0 9.6 17.0 14.0 25.0 32.0 X 47.0 2.7 3.5 4.8 7.0 7.5 10.5 30.0 9.8 12.0 2 55 65 8 17 108 28 78 16 8 634 488 X X 700-3000 10.8 13.8 10.8 535 85 17 121 28 78 16 8 734 518 NilllEER OF UNFILLED ORDERS 109 21 12 15 6 15 7 34 36 25 30 200 45 23 18 61 8 18 1 0 2 8 13 5 1 4 60 20 2 1400 800 200 26 34 260 65 25 20 1182 333 1171 2080 200-400 420-680 620-1080 11 35 15 145 40-60 3 15-20 45-60 0 0 1 15 17 11 35 16 160 57-77 3 15-20 60-90 10 15-45 15-30 10-40 70-100 240-400 50-100 20-30 20 23 20-40 180 30 800 150 800 46 58 230 130 X X X X X 1 0 18 0 0 0 0 0 4 8 0 35 32 32 X 1 X X X X X X X X X 240-400 70-130 26 3 3 7 160 220 275 40 15 90 55 26 23-43 255 30 960 370 1075 86 73 320 185 X 0 X X COMPUTERS and AUTOMATION for January, 1973 \-. NANE OF NANUFACTURER Honeywell (cont'd) IBN Hhite Plains, N.Y. (N) (D) (12/72) Interdata Oceanport, N.J. (A) (11/72) Hicrodata Corp. Santa Ana, Calif. (A) {11/72) NCR Dayton, Ohio (A) (12/72) Phil co Willow Grove, Pa. (N) (1/69) NANE OF COHPUTER H-1400 H-1800 H-2200 H-3200 H-4200 H-8200 DDP-24 DDP-116 DDP-124 DDP-224 DDP-316 DDP-416 DDP-516 H112 H632 H1602 H1642 H1644 H1646 H1648 H1648A • 305 650 1130 1401 1401-G 1401-H 1410 1440 1460 1620 I, II 1800 7010 7030 704 7040 7044 705 7020, 7074 7080 7090 7094-1 7094-II System/3 Hodel 6 Sys tem/ 3 Hodel 10 System/7 360/20 360/25 360/30 360/40 360/44 360/50 360/65 360/67 360/75 360/85 360/90 360/190 360/195 370/135 370/145 370/155 370/158 370/165 370/168 370/195 Nadell Nadel 3 Hodel 4 Hodel 5 Hodel 15 Hodel 16 Hodel 18 Hodel 50 Hodel 70 Hodel 80 Hicro 400 Hicro 800 Hicro 1600 304 310 315 315 RHC 390 500 Century 50 Century 100 Century 101 Century 200 Century 300 1000 200-210,211 2000-212 COMPUTERS and AUTOMATION for January, 1973 DATE OF FIRST INSTALLATION AVERAGE OR RANGE OF HONTHLY RENTAL $(000) NUHBER OF INSTALLATIONS In Outside In Hor1d U.S.A. U.S.A. 4 15 125 20 18 10 6 5 60 2 2 3 10 20 185 22 20 1/64 1/64 1/66 2/70 8/68 12/68 5/63 4/65 3/66 3/65 6/69 14.0 50.0 18.0 24.0 32.5 50.0 2.65 9/66 10/69 12/68 1.2 3.2 90 250 250 60 450 350 900 75 12 11/68 12.0 20 X X X 0.6 X 12/57 10/67 2/66 9/60 5/64 6/67 11/61 4/63 10/63 9/60 1/66 10/63 5/61 12/55 6/63 6/63 11/55 3/60 3/60 8/61 11/59 9/62 4/64 3/71 1/70 11/71 12/65 1/68 5/65 4/65 7/66 8/65 11/65 10/65 2/66 12/69 11/67 4/71 5/72 9/71 2/71 -/73 5/71 -/73 6/73 12/70 5/67 8/68 11/70 1/69 5/71 6/71 5/72 10/71 10/72 12/70 12/68 12/71 1/60 5/61 5/62 9/65 5/61 10/65 2/71 9/68 12/72 6/69 2/72 6/63 10/58 1/63 3.6 4.8 1.5 5.4 2.3 1.3 17.0 4.1 10.0 4.1 5.1 26.0 160.0 32.0 25.0 36.5 38.0 27.0 35.0 60.0 63.5 75.0 83.0 1.0 1.1 0.35 and up 2.7 5.1 10.3 19.3 11.8 29.1 57.2 133.8 66.9 150.3 232.0 14.4 23.3 48.0 49.5-85.0 98.7 93.0-170.0 190.0-270.0 3.7 8.5 X 20.0 X X 6.8 6.8 14.9 0.1-0.5 0.2-3.0 0.2-3.0 X X 7.0 9.0 0.7 1.0 1.6 2.6 3.7 7.0 21.0 X X X NlJ}1BER OF UNFILLED ORDERS X X 13 40 50 2580 2210 420 180 156 1690 194 285 415 67 4 12 35 28 18 10 44 13 4 10 6 2 15 18 1227 1836 450 140 116 1174 63 186 148 17 1 1 27 13 3 3 26 2 2 4 4 55 68 3807 4046 870 320 272 2864 257 471 563 84 5 13 2 41 21 13 70 15 6 14 10 7161 1112 5487 2454 109 1135 601 57 50 11 5 13 6075 759 2535 1524 57 445 144 6 17 1 13236 1871 8022 3977 166 1580 745 63 67 12 5 15 9 X X X X X 1780 1287 1363 39 662 562 99 12 55 48 3 1 205 75 270 70 40 1 2 7 207 4 160 1916 263 5 8 255 55 160 115 20 24 5 6 3 49 0 0 700 80 2 0 200 35 325 1750 0 780 llOO 580 1175 50 575 5 16 16 12 330 5 280 200 385 90 64 6 8 10 256 4 125 2616 343 7 8 455 90 485 3650 600 1955 50 905 10 85 X 40 X X X X 21 141 21 X X X X X 49 NAME OF MANUFACTURER Raytheon Data Systems Co. Norwood, Mass. (A) (10/72) Standard Computer Corp. Los Angeles, Calif. (A) (6/72) Systems Engineering Laboratories Ft. Lauderdale, Fla. (A) (12/72) UNIVAC Div. of Sperry Rand New York, N.Y. (A) (4/72) UNIVAC - Series 70 Blue Bell, Pa. (A) (11/72) Varian Data Machines Newport Beach, Calif. (A) (8/72) Xerox Data Systems E1 Segundo, Calif. (N) (R) (12/72) DATE OF AVERAGE OR RANGE FIRST OF MONTHLY RENTAL $(000) INSTALLATION 12/60 X 250 X 3/64 440 X 520 10/65 10/67 12.5 703 7.2 704 3/70 19.0 5/69 706 IC 4000 12/68 9.0 IC 6000-6000/E 16.0 5/67 IC 7000 17.0 8/70 IC-9000 400.0 5/71 SYSTEMS 810B 2.6 9/68 SYSTEMS 71 0.9 8/72 SYSTEMS 72 1.0 9/71 SYSTEMS 85 6.0 7/72 SYSTEMS 86 10.0 6/70 I & II X 3/51 & ll/57 III X 8/62 File Computers 8/56 X Solid-State 80 I, II, 90, I, II, & Step X 8/58 418 11.0 6/63 490 Series 12/61 30.0 1004 2/63 1.9 1005 2.4 4/66 1050 9/63 8.5 1100 Series (except ll07, 1108) X 12/50 X 1107 10/62 1108 68.0 9/65 9200 1.5 6/67 9300 3.4 9/67 9400 7.0 5/69 LARC 5/60 135.0 301 2/61 7.0 14.0-18.0 501 6/59 14.0-35.0 601 11/62 3301 17.0-35.0 7/64 Spectra 70/15, 25 4.3 9/65 Spectra 70/35 1/67 9.2 Spectra 70/45 22.5 11/65 Spectra 70/46 33.5 Spectra 70/55 34.0 11/66 Spectra 70/60 32.0 11/70 Spectra 70/61 42.0 4/70 16.0 70/2 5/71 70/3 25.0 9/71 25.0 70/6 9/71 12/71 35.0 70/7 X 620 11/65 620i 6/67 X R-620i 4/69 520/DC, 520i 12/69;10/68 620/f 11/70 620/L 4/71 620/f-l00 6/72 620/L-100 5/72 Varian 73 XDS-92 4/65 1.5 XDS-910 2.0 8/62 XDS-920 9/62 2.9 XDS-925 12/64 3.0 XDS-930 3.4 6/64 XDS-940 14.0 4/66 XDS-9300 8.5 11/64 Sigma 2 12/66 1.8 Sigma 3 2.0 12/69 Sigma 5 6.0 8/67 Sigma 6 12.0 6/70 Sigma 7 12/66 12.0 Sigma 8 2/72 Sigma 9 35.0 NAME OF COMPUTER USE ECONOMICAL C&A CLASSI FI ED ADS to buy or sell your computer and data processing equipment, to offer services to the industry, to offer new business opportunities, to seek new positions or to fill job vacancies, etc. Rates for Classifed Ads: 90i per word - minimum, 20 words First line all capitals - no extra charge (Ads must be prepaid) Send Copy to: COMPUTERS AND AUTOMATION 815 Washington Street Newtonville, MA 02160 Telephone (617) 332-5453 50 (5) (5) (5) (5) NUMBER OF INSTALLATIONS In Outside In U.S.A. World U.S.A. 20 115 135 20 26 1 27 175 33 208 260 70 330 15 75 90 0 9 9 3 0 3 4 0 4 1 0 1 168 10 178 14 3 31 23 25 13 210 80 76 1522 617 l36 9 8 103 1106 412 82 2 144 16 3 71 17 102 303 34 15 12 7 58 4 l3 7 43 170 120 15 159 32 25-30 163 13 29 3 1 1 NUMBER OF UNFILLED ORDERS X X X 4 30 2 2 17 4 32 31 X X X X 39 14 610 248 59 119 90 2132 865 195 23 E 15 0 3 129 835 62 41 0 9 11 232 1941 474 123 2 X X 58 E 725 510 E 83 E 75 1300 80 350 201 474 13 21 X 4 10 12 1 14 3 4 36 0 14 30 3 ADVERTISING 72 X 3 114 16 19 12 47 180 132 16 173 35 25-34 199 10 43 37 INDEX Following is the index of advertisements. Each item contains: name and address of the advertiser / name of the agency, if any / page number where the advertisement appears. THE C&A NOTEBOOK ON COMMON SENSE, ELEMENTARY AND ADVANCED, published by Computers and Automation, 815 Washington St., Newtonville, Mass. 02160/ Pages 2, 3 COMPUTERS AND AUTOMATION, 815 Washington St., Newtonville, Mass. 02160/ Page 51 WHO'S WHO IN COMPUTERS AND DATA PROCESSING, jointly published by Quadrangle Books (a New York Times Company) and Berkeley Enterprises, Inc., 815 Washington St., Newtonville, Mass. 02160/ Page 52 COMPUTERS and AUTOMATION for January. 1973 I .~ WILL YOU HELP? Yes, you. It may come as a surprise that you'd be asked . . . but as a reader of Computers & Automation you are in a unique position to help us. NAMES ... people, institutions, companies who should be interested in 1) the computer industry and/or 2) seeking truth in information are very much needed to join you as readers of C&A. Please give us their names and addresses on the form below or add another sheet of paper. Trim out the card with scissors and drop it in the mail. We'll gladly pay the postage to learn of possible new friends. And many thanks for your help! As a token of our appreciation we'll send you our ****Reprint . P.S. If you like you may mail your list separately to: R. A. Sykes, Circulation Mgr. Computers & Automation 815 Washington Street Newtonville, MA 02160 Will you tell us who they are? And perhaps even more, will cut here and tuck in flap r--------------------------, you let us use your name in writing to them? But with or without your name (we'll only use it if you grant permission) we need to know those you think might be interested in also reading C&A. i I / / COIT1~!ila~!!£!' (1) Name / cut here l- 2 ·~ al 2' .~ e :.! e OJ U Vl ~ <1l r I l Iw ::J ..J (l) 0 a: a.. a: ~ ·c Q) Gi o DYES NO \ \ I I YES, start my subscription to COMPUTERS AND AUTOMATION according to the instructions checked below. One Year (including the Computer Directory and Guide - 13 issues) U.S. only. 0 Buyers' $18.50 One Year (excluding the Computer Directory and Guide - 12 issues) U.S. only. 0 Buyers' $9.50 Name: _ _ _ _ _ _ _ __ Title: Organization: _ _ _ _ _ _ _ _ _ _ _ __ Address: _ _ _ _ _ _ _ _ _ __ City: _ _ _ _ _ _ __ State: _ _ _ _ _ Zip: C/) CII \ I I \ Z w " I \ City _ _ _ _ _ _ _ _ State _ _ _ _ ZI P _____ .~ • c: V) ,I \ \ May we use your name? .~ w a.. /. \ \ Please give us your name and address on the form below so we can " send you your * * * * Reprint. Just cross out the subscription request / - unless you also want to enter your new or renewal order. · f6 a: ~ \ / / / I ~ u. la Address _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ / ::E !:: len I~ / en en a: (2) Name _____________________________ Ir+ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ Fold here - do not cut ~ en - .n; CD - 0 Q) III I E OJ ...J ~ ~ ~ ...J a.. w ~ ~ (l) u (l) c a: en en ~ 2 2b W Cii ::J OJ 0. E ~ 00. 0 2 w ~ a.. w CD Z a ~ « ~ :J « 0 Z « en ex:: ~ :J <:J c ....e ~ Q) Z Payment enclosed Bill me OJ P.O. No.: o o ~ III ::I Renewal Cl New subscription 0 Q) To SPEED the processing of your order, please check the one best descriptor in each of the two categories below. (ThIS IOforma[1on will be used for statistical purposes only.) BUSINESS TYPE aI-Computer Manufacturer 02-Aerospace / Aircraft Manufacturer 03-0ther Manufacturing 04-Raw Materials Processing; (chemical, primary metal, petroleum, food, etc.) OS-Mining and Construction 06-Computing & Consulting 07-Finance, Insurance, Pub!', and Service Organizations OB-Transportation Companies 09-Public Utilities la-Research II-Wholesale, Retail, Sales, and Marketing Firms 12-Educational; (College, University, or School) 13-Government and Military 14-Libraries JOB FUNCTION l-Technical Management; (computer installation management, program management, or engineering mgmU 2-Computer Center Personnel; (methods & procedure analysts, and operators) 3-Programming Personnel; (systems, application & research programmers) 4-Professional: (systems analysts, mathematicians, operations researchers, and professors) 5-General Management Executives; (corporate officers, owners, and partners) 6-E~gineering Personnel; (systems . engineers, research a. development enilneers) 7-Research Personnel 8-Students 9-Library Subscription 10-Subscription in Company Harne Only a. <1l ti I
Source Exif Data:File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:25 00:12:42-07:00 Create Date : 2009:03:25 00:12:42-07:00 Metadata Date : 2009:03:25 00:12:42-07:00 Format : application/pdf Document ID : uuid:35db7505-bf40-44a7-ba1d-af33140608ea Instance ID : uuid:a2896135-9a0e-41c6-8415-2f3d7514bf5c Page Layout : SinglePage Page Mode : UseNone Page Count : 52EXIF Metadata provided by EXIF.tools