197412

197412 197412

User Manual: 197412

Open the PDF directly: View PDF PDF.
Page Count: 36

Download197412
Open PDF In BrowserView PDF
computers

December, 1974

scrE~e{AND' sUs.

and people

formerly Computers and Automation

NDESERT ROSEN

Engineering Computer Programs: How They Grow
- A. Marcos and S. L. Chu

Changing Technology and
Medical Specialization
-

Ray M. Antley and
Mary Ann Antley

The Computer Industry
and Unionization
- A. A. I mberman

The Radiation from Computers I nto Everywhere
- Neil Macdonald

Watergate South
- Nancy A. Miller

The Assassination of the
Reverend Martin Luther
King, Jr., Conclusion
- Wayne Chastain, Jr.

.. (:-

INVENTORY OF THE 36 ISSUES OF

- TITLES AND SUMMARIES

THE NOTEBOOK ON COMMON SENSE, FIRST YEAR
VOLUME 1

VOLUME 2

1. Right Answers - A Short Guide to Obtaining Them
A collection of 82 principles and maxims. Example:
"The moment you have worked out an answer, start
checking it - it probably isn't right."
2. The Empty Column
A parable about a symbol for zero, and the failure
to recognize the value of a good idea.
3. The Golden Trumpets of Yap Yap
4. Strategy in Chess
5. The Barrels and the Elephant
A discussion of truth vs. believability.
6. The Argument of the Beard
The accumulation of many small differences may
make a huge difference.
7. The Elephant and the Grassy Hillside
The concepts of the ordinary everyday world vs.
the pointer readings of exact science.
8. Ground Rules for Arguments
9. False Premises, Valid Reasoning, and True Conclusions
The fallacy of asserting that the prem ises must first
be correct in order that correct conclusions be
derived.
10. The Investigation of Common Sense
11. Principles of General Science and Proverbs
8 principles and 42 proverbs.
12. Common Sense - Questions for Consideration
13. Falling 1800 Feet Down a Mountain
The story of a skimobiler who fell 1/3 of a mile
down Mt. Washington, N.H., and was rescued the
next day; and how he used his common sense and
survived.
14. The Cult of the Expert
15. Preventing Mistakes from Failure to Understand
Even though you do not understand the cause of
some trouble, you may still be able to deal with
it. The famous example of a cure for malaria.
16. The Stage of Maturity and Judgement
17. Doomsday in St. Pierre, Martinique - Common Sense
vs. Catastrophe
How 30,000 people refusing to apply their common
sense died from a volcanic eruption.
18. The History of the Doasyoulikes
19. Individuality in Human Beings
Their chemical natures are as widely varied as
their external features.
20. How to be Silly
71 recipes for being silly. Example: "Use twenty
words to say something when two will do."
21. The Three Earthworms
A parable about curiosity; and the importance of
making observations for oneself.
22. The Cochrans vs. Catastrophe
The history of Samuel Cochran, Jr., who ate some
vichyssoise soup.
23. Preventing Mistakes from Forgetting
24. What is Common Sense? An Operational Definition
A proposed definition of common sense not using
synonyms but using behavior that is observable.
25. The Subject of What is Generally True and Important Common Sense, Elementary and Advanced
26. Natural History, Patterns, and Common Sense
Some important techniques for observing.
27. Rationalizing and Common Sense
28. Opposition to New Ideas
Some of the common but foolish reasons for
opposing new ideas.
29. A Classification and Review of the Issues of Vol.
30. Index to Volume 1

31. Adding Years to your Life Through Common Sense
A person who desires to live long and stay well needs
to understand some 20 principles, including how to
test all the health advice he receives for its common
sense, and how to develop habits of health practices
which fit him.
32. The Number of Answers to a Problem
Problems may have many answers, one answer, or no
answer ... and answers that are good at one time may
be bad at another.
33. "Stupidity has a Knack of Getting Its Way"
" ... as we should see if we were not always so much
wrapped up in ourselves."
- Albert Camus
34. Time, Sense, and Wisdom - Some Notes
The supply of time, the quantity of time, the kinds of
time, and the conversion of time. . .. A great deal of
the time in a man's life is regularly, systematically, and
irretrievably wasted. This is a serious mistake.
35. Time, Sense, and Wisdom - Some Proverbs and Maxims
56 quotations and remarks by dozens of great men.
36. Wisdom - An Operational Definition
"A wise person takes things as they are and, knowing
the conditions, proceeds to deal with them in such a
manner as to achieve the desired result."
- Somerset Maugham
EXCITING:
Q: Is the Notebook exciting?
A: Some of the issues, like "Falling 1800 Feet Down a
Mountain" and "Doomsday in St. Pierre, Martinique",
are among the most exciting true stories we know.
USEFUL:
Q: Is the Notebook useful?
A: It ought to be useful to anybody - as useful as
common sense. There exists no textbook on common
sense; the Notebook tries to be a good beginning to
common sense, science, and wisdom.
PAST ISSUES: As a new subscriber, you do not miss past issues. Every subscriber's subscription starts at Vol. 1, no.
1, and he eventually receives all issues. The past issues
are sent to him usually four at a time, every week or
two, until he has caught up, and thus he does not miss
important and interesting issues that never go out of date.

2

GUARANTEE: (1) You may return (in 7 days) the first batch
of issues we send you, for FULL REFUND, if not satisfactory. (2) Thereafter, you may cancel at any time, and
you will receive a refund for the unmailed portion of
your subscription. WE WANT ONLY HAPPY AND SATISFIED SUBSCRIBERS.
I - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - - - - ~

To: Berkeley Enterprises, Inc.
815 Washington St., Newtonville, MA 02160
) YES, I would like to try the "Notebook on Common
Sense, Elementary and Advanced". Please enter my
subscription at $12 a year, 24 issues, newsletter style,
and extras. Please send me issues 1 to 6 as FREE
PREMI UMS for subscribing.
I enclose _ _ _ _ __
) Please bill my organization.
Name
Title _ _ _ _ _ _ _ _ __
Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address ______________________________________
Signature _ _ _ _ _ _ _ _ _ Purch. Order No. ______
COMPUTERS and PEOPLE for December, 1974

The Notebook on
COMMON SENSE, ELEMENTARY AND ADVANCED
is devoted to development, exposition, and illustration of what
may be the most important of all fields of knowledge:

WHAT IS GENERAllY TRUE AND IMPORTANT

+

WISDOM

+

9
1

+

+

+

+

PURPOSES:
to
to
to
to
to
to
to
to
to

help you avoid pitfalls
prevent mistakes before they happen
display new paths around old obstacles
point out new solutions to old problems
stimulate your resourcefulness
increase your accomplishments
improve your capacities
help you solve problems
give you more tools to think with

AVOIDANCE
OF
LOGICAL
FALLACIES

Topic:
THE SYSTEMATIC
PREVENTION OF MISTAKES

Topic:
SYSTEMATIC EXAMINATION
OF GENERAL CONCEPTS

Already Published

Already Published

Preventing Mistakes from:
Failure to Understand
Forgetting
Unforeseen Hazards
Placidity
Camouflage
To Come

Preventing Mistakes from:
Bias
Interpretation
Distraction
Gullibility
Failure to Observe
Failure to Inspect
Prejudice

8REASONS TO BE INTERESTED IN THE FIELD OF
COMMON SENSE, WISDOM, AND GENERAL SCIENCE
COMPUTERS are important But the computer field is over 25 years old. Here is a new
field where you can get in on the ground floor to make
your mark.
MATHEMATICS is important But this field is more important than mathematics, because
common sense, wisdom, and general science have more
applications.
.LOGIC is important o
But this field is more important than logic, because common:
sense plus wisdom plus science in general is much broader
than logic.
WISDOM is important This field can be reasonably called "the engineering of
wisdom".
COMMON SENSE is important This field includes the systematic study and development of:
common sense.
o
SCI ENCE is important This field includes what is common to all the sciences, what:
is generally true and important in the sciences.
MISTAKES are costly and to be AVOIDED This field includes the systematic study of the prevention of :
mistakes.
MON EY is important The systematic prevention of mistakes in your organization
might save 10 to 20% of its expenses per year.
0

0

COMPUTERS and PEOPLE for December, 1974

+

+

The Concept of:
Expert
Rationalizing
Feedback
Model
Black Box
Evolution
Niche
Understanding
To Come

Strategy
Teachable Moment
Indeterminacy
System
Operational Definition

- - - - - - - - - - - - - - - (may be copied on any piece of paper) - - - - - - - - - - . - - . - - - - - - - - - . ~

To: Berkeley Enterprises, Inc.
815 Washington St., Newtonville, MA 02160
) Yes, please enter my subscription to The Notebook on Common
Sense, Elementary and Advanced at $12 a year (24 issues), plus
extras. I understand that you always begin at the beginning
and so I shall not miss any issues.
(

)

Please send me as free premiums for subscribing:

1. Right Answers - A Short Guide to Obtaining Them
2. The Empty Column
3. The Golden Trumpets of Yap Yap

( ) I enclose $

4. Strategy in Chess
5. The Barrels and the Elephant
6. The Argument of the Beard

) Please bill my organization

RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY

HOW CAN YOU LOSE?
Name _ _ _ _ _ _ _ _ _ _ _ _ _ Title _ _ _ _ _ _ __
Organization _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Address (including zip) _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Signature _ _ _ _ _ _ _ _ _ __

Purchase Order No. _ _ __

3

Vol. 23, No. 12
December, 1974
Editor and
Publisher

Edmund C. Berkeley

Assistant
Editors

Barbara L. Chaffee
Linda Ladd Lovett
Neil D. Macdonald

Art Editor

Grace C. Hertlein

Software
Editor

Stewart B. Nelson

Contributing
Editors

George N. Arnovick
John Bennett
Moses M. Berlin
Andrew D. Booth
John W. Carr III
Ted Schoeters
Richard E. Sprague

London
Thomas Land
Correspondent
Advisory
Committee

Ed Burnett
James J. Cryan
Bernard Quint

Editorial
Offices

Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, MA 02160
617-332-5453

Advertising
Contact

The Publisher
Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, MA 02160
617-332-5453

"Computers and
People,"
formerly
"Computers and Automation," is published
monthly, 12 issues per year, at 815 Washington St., Newtonville, MA 02160, by Berkeley
Enterprises, I nco Printed in U.S.A. Second
Class Postage paid at Boston, MA, and additional mailing points.
Subscription rates: United States, $11.50
for one year, $22.00 for two years. Canada:
add $1 a year; Mexico, add $6 a year. Elsewhere:
one year, Swiss francs 60; order
through Reliable Information Publishing
Company, P.O. Box 52, 6354 Vitznau,
Switzerland.
NOTE: The above rates do not include
our publication "The Computer Directory
and Buyers' Guide".
If you elect to receive "The Computer Directory and Buyers'
Guide," please add $12.00 per year to your
subscription rate in U.S. and Canada, and
$15.00 in Mexico; elsewhere, the price of
the Directory is Swiss francs 90, not including postage and handling;
please order
through Reliable I nformation Publishing
Company, P.O. Box 52, 6354 Vitznau,
Switzerland.
Please address mall to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160, or to Berkeley Enterprises,
Inc., c/o Reliable I nformation Publishing
Co., P.O. Box 52, 6354 Vitznau, Switzerland.
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160.
© Copyright 1974, by Berkeley Enterprises, Inc.
Change of address:
If your address
changes, please send us both your new
address and your old address (as it appears on the magazine address imprint), and
allow three weeks for the change to be
made.

4

computers
and people

formerly Computers and Automation

Computers and Engineering
8 Engineering Computer Programs: How They Grow
by A. Morcos and S. L. Chu, Sargent and Lundy,
Chicago, III.
How computer programs for engineering situations
actually develop and evolve.

[A]

Computers and Medicine
15 Changing Technology and Medical Specialization
by Ray M. Antley and Mary Ann Antley,
Indianapolis, Ind.

[A]

How 25 years of applying computer systems in
medicine are leading to integrated control of the
environment for the benefit of patients.

The Computer Industry
12 The Computer Industry and Unionization
by A. A. I mberman, Imberman and DeForest, Chicago, III.
How to really listen to employee grievances while
they are still minor, and respond quickly to them, to
the advantage of nearly everybody concerned.

[A]

11 The Radiation from Computers Into Everywhere
by Neil Macdonald, Survey Editor, Computers and People
Some of the ever-widening influences of computers
upon many different areas.

[A]

7 Contact with Holders of the Certificate of Data Processing
by John K. Swearingen, Pres., I nstitute for Certification
of Computer Professionals, Chicago, III.
An effort to reach all COP holders.

[F)

7 Annual Computer Programming Contest
by Dr. Gary G. Bitter, Arizona State Univ.
For students in grades 7 to 12: the annual contest
of the Association for Educational Data Systems.

[F)

..

Applications of Computers

,

32 Computing and Data Processing Newsletter
Computer Gives New Mexico Museum Full Access to
its Mineral Collection
Computer System for a Racing Yacht that Won
Cameras and Computers Combine to Analyze
Rocket Flights

[C)

[Front Cover]
1 "Desert Rose"
A "desert rose" of crystal gypsum, at the New Mexico
Mineralogical Museum of the New Mexico Bureau of
Mines. A computer uses X-ray results to analyze each
specimen, and catalogs it. See page 32.

COMPUTERS and PEOPLE for December, 1974

The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input, output, and processing, for the benefit of people.

ANNOUNCEMENT
6 "1 Am Interested To Know What a Computer Can Do
For Me"
by Edmund C. Berkeley, Editor
What sorts of questions a computer can answer, and
how it answers them.

[E]

7 "Computer Art for the Artist" - Comment
by James C. Ver Hague, Jr., State University of New York
at Buffalo
Additional information wanted for teaching computer
art.

[F]

7 "Can Tigger Think? Can Peder Think?" - Comment
by Bryce M. Mitchell, Universidade Federal de Sao
Carlos, Sao Carlos, Brazil

[F]

THE COMPUTER CENSUS
which Computers and People has published in the past will now be published
separately and more completely as a
quarterly service, regular subscription
price $33.00 per year. Until January:
10, 1975, any subscriber to Computers
and People may subscribe at half price.
Outside U.S., Canada, and Mexico,
please add $5.00 per year for additional costs.

The Profession of Information Engineer and the Pursuit of Truth
18 Watergate South

NEW CONTRACTS AND
NEW INSTALLATIONS

[A]

which Computers and People has published in the past will now be published
separately and more completely as a
bimonthly service, regular subscription
price $30.00 per year. Until January
10, 1975, any subscriber to Computers
and People may subscribe at half price.
Outside U.S., Canada, and Mexico,
please add $5.00 per year for additional costs.

by Nancy A. Miller, Princeton, N.J.
How a third effort was made by many Watergateconnected figures to provoke violence and riots, and
prepare the groundwork for a cancelation of the
1972 elections.
26 The Assassination of the Reverend Martin Luther King, Jr.,
and Possible Links with the Kennedy Murders - Part 11
(Conclusion)
by Wayne Chastain, Jr., Attorney, Memphis, Tenn.
The final instalment of a report of a diligent study
into the details and circumstances of the assassination
of the Reverend Martin Luther King, Jr., on April 4,
1968, and related events, and the considerable evidence
of a conspiracy.

[A]

Computers, Puzzles, and Games
30 Games and Puzzles for Nimble Minds - and Computers
[C]
by Neil Macdonald, Assistant Editor
GIZZMO - Some computational Jabberwocky.
MAXIMDIJ - Guessing a maxim expressed in digits.
NA YMANDIJ - A systematic pattern among randomness?
NUMBLES - Deciphering unknown digits from arithmetical relations.
SIXWORDO - Paraphrasing a passage into sentences of
not more than six words each.

-

- -

-

I

-

- -(may be copied on- - - - - - - - any piece of paper)

TO:

Computers and People
Berkeley Enterprises, Inc.
815 Washington Street
Newtonville, MA 02160, U.S.A.

(

YES, please send me
( ) THE COMPUTER CENSUS,
quarterly, at $33.00 a year

)

NEW CONTRACTS AND NEW
INSTALLATIONS, bimonthly,
at $30.00 a year
(

)

I claim 50% discount as a subscriber to
Computers and People

Total payment _ _ _ _ __

Key
[A]

[C]
[E]
[F]

NOTICE

Article
Monthly Column
Editorial
Forum

*0 ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER
DIRECTORY.
*N MEANS THAT
YOUR PRESENT SUBSCRIPTION
DOES NOT INCLUDE THE COMPUTER DIRECTORY.

COMPUTERS and PEOPLE for December, 1974,

I enclose check
Please bill my organization; the purchase order no. is _ _ _ _ __
My name and address are attached.

5

EDITORIAL

ttl Am Interested To Know
What a Computer Can Do For Me"

The man who said that to me was an old friend. He
was no mathematician, but a former dean of a dental
school; he had specialized in dental public health;
he had had an excellent education. In spite of being no mathematician he had navigated a small ship
out of sight of land; and he had computed means, standard deviations, chi-squared tests, and other statistical measures.
How could I answer this useful question?
The first step was to send him a list of many applications of computers. In 1973 we published a list
of over 2400 applications of computers. That list
contained 179 applications in medicine; here is a
small excerpt:

A computer can figure out averages, standard deviations, chi-squared tests, and other statistical
measures -- if you want to know them. You can usually buy a map for this purpose, which will be called a "computer program." A computer can even tell
you the answer (if you want to know it) to such a
question as, "What is the minimum number of cubes
whi ch when added wi 11 equal a gi ven number?" and
which cubes they are. For example, suppose the given number is 229. Then the ariswer is that the minimum number of cubes is 7; and there are exactly three
solutions, and here they are:
3 x 64 + 1 x 27 + 1 x 8 + 2 x 1
1 x 125 + 1 x 64 + 5 x 8
1 x 216 + 1 x 8 + 5 x 1

Coronary artery disease prediction
Cystic fibrosis: detection in new-born babies
Cytology diagnosis
Cytophotometric analysis
Dermatoglyphic analysis
But what is the second step? What ideas do you
give to an ordinary person (nontechnical but educated) so that he can conceive of how a computer can
be of help to him?
In the case of a motor car, there is no great
problem in "knowing what a motor car can do for me."
A car can take you somewhere where you want to go.
And you are already full of ideas of places where
you want to go.
However, for any particular trip in a motor car
you have to make a decision about where you want to
go. Also, if you do not know the way there, you have
to get hold of a map and choose the way: which roads
you will travel on, how far on each you will go, what
turnings you will take, what signs you will be guided
by.
Much the same situation applies when you want to
find some information that has probably been published. Recently at a birthday party somebody showed me
an old book: Volume 2 of "The Life of George Washington" by Washington Irving, published in 1900. My
curiosity was stirred about George Washington. The
next day I looked up in an encyclopedia the entry
"George Washington," and sati sfied much of my curiosity. I used the standard travel-map rules applying
to reference books: begin with an encyclopedia, and
look for the topic name in alphabetical sequence.
A computer, like a motor car and a reference book,
can take you where you want to go. First you have
to want to know something, and second you have to obtain knowledge of how to figure it out.

6

In this case, the map, the way to produce the answers
desired, will probably require some clever programmer to spend several hours producing a sequence of
some 300 instructions in machine language that the
computer needs for a map.
The situation of computer maps is much like driving your car in a strange land where there is no
light, only thick black darkness -- and all the signs
are written in a language that you do not understand.
So before you start out driving, you have to get from
somebody a complete and accurate set of instructions;
and the instructions must include the names of the
signposts at the intersections; and when you come to
an intersection, you turn on your flashlight, read
all the signs carefully, compare them with the appropriate notes in your set of instructions, and
then try your best to choose the right turning.
Fortunately, in this dark land where computer
maps are used, whenever you travel a second time
from place A to place B, if your road map worked OK
the first time, then it will work OK over and over
again. And each later time it will work lightning
fast. So whenever you want to travel again, you
have practically no problem at all. The inefficiency of the first trip is replaced by utmost efficiency for all later trips.
But you still need a place you want to go to (a
question you want answered) and a map of how to get
there (a complete set of instructions for figuring
out the answer).

E"~d...c. .. ~
Edmund C. Berkeley
Editor

COMPUTERS and PEOPLE for December. 1974

THE PURPOSE OF FORUM

• To give you, our readers, an opportunity to discuss
ideas that seem to you important.
• To express criticism or comments on what you find
published in our magazine.
• To help computer people and other people discuss
significant problems related to computers, 9ata
processing, and their applications and implications,
including information engineering, professional behavior, and the pursuit of truth in input, output,
and pro cessing.

MULTI-ACCESS FORUM

Your participation is cordially invited.

ANNUAL COMPUTER PROGRAMMING CONTEST
AEDS Programming Contest
Association for Educational Data Systems
Dr. Gary G. Bitter
College of Education
Arizona State Univ.
Tempe, AZ 85281

This 12th annual contest is for students in Grades
7 through 12. Seven first prizes of $25 (in bonds)
will be awarded in the categories: business, biological science; computer science; games; humanities;
mathematics; physical science. A Grand Prize of
$100 (in bonds) will be awarded to one of the winners in the individual categories. All entries must
be received by March 1.

Like a number of people interested in computer
art, my background is primarily a technological one.
I have an M.S. in mathematics and worked for four
years in the aerospace developing computer programs
for structural analysis research. While working on
one of the plot programs, I accidentally began generating forms that suggested sculptural possibilities to me. Eventually, I became more interested
in the potentialities of computer art than in the
work I was doing and finally quit to obtain more
formal training in the field of art. I am currently a Teaching Assistant completing my final year in
the M.F.A. Program at Buffalo.
I am looking forward to receiving your detailed
course plan.

The Association, also known as AEDS, is a national
organization comprised of administrators, teachers,
systems analysts, and programmers of educational data
processing systems in vocational, public, and private schools. The contest is on the approved list
of national contests and activities of the National
Association of Secondary School Principals.

Bryce M. Mitchell
universidade Federal de Sao Carlos
Laboratorio de Idiomas
Sao Carlos 13560, Brazil

The Programming Contest winner will receive not
only a U.S. Savings Bond but also an expense-paid
trip to the 1975 AEDS Convention in Virginia Beach,
Virginia, on April 29-May 2. The winning student's
teacher also will receive an expense-paid trip to
the convention.

We would like to request permission to reprint
a section from "Computers and People," Vol. 23, No.
6, page 6. We propose to use this editorial by
Edmund C. Berkeley as a reading in a textbook for
the teaching of scientific and technical English to
speakers of other languages. We will, of course,
give full credit to the source. Thank you very
much for your consideration in this matter.

"CAN TIGGER THINK? CAN PEDER THINK?" - COMMENT

EditD.rial Note:

Permission granted.

"COMPUTER ART FOR THE ARTIST" - COMMENT
To: The Art Editor:
From:

James C. Ver Hague, Jr.
Department of Art
State Univ. of New York at Buffalo
Buffalo, NY 14214

Your article, "Computer Art for the Artist," appearing in the August 1974 issue of "Computers and
People," was very interesting to me. The Department
of Art here is initiating a course in computer art
and graphics beginning this fall semester. As the
instructor for the course, I found your outline to
be very well-conceived and have restructured some
of the planned course material as a result. I would
very much appreciate your sending to me a more detailed course plan including your bibliography of
references and/or any additional material that you
feel might aid in getting such a course successfully
off the ground. Does there exist the possibility
of an exchange of computer programs either with you
or others that have taught a similar course?
COMPUTERS and PEOPLE for December, 1974

CONTACT WITH HOLDERS OF THE CERTIFICATE OF
DATA PROCESSING
John K. Swearingen, President
Institute for Certification of Computer Professionals
Box 1442
Chicago, III. 60690

The Institute of the Certification of Computer
Professionals on October 5, 1974 made its first mailing to approximately 15,000 holders of the Certificate of Data Processing (COP).
In order to contact those COP holders whose upto-date address we did not have, would you please
publish this notice, addressed to holders of the
Certificate:
If you did not receive our mailing of October
5, 1974, it is probably because we do not have
your correct address. We have a message of interest and importance to you. Please send us
your correct address, class year, and your Certificate Number if available.
7

Engineering Computer Prlograms: How They Grow
A. Marcos

S. L. Chu
Structural Analytical Division
Sargent and Lundy, Engineers
55 East Monroe St.
Chicago, IL 60603

"Although a program cannot as yet take over conceptual design, nevertheless, used as a
tool for analysis, it can study complex models swiftly, and provide reliable and quick
estimates of the merits of various engineering solutions to a problem. "

Two Basic Functions

In engineering design firms, computer programs
perform two basic functions: carrying out calculations, and presenting the results in a prescribed
format. Yet neither the programs nor the functions
they perform are static. Both change as often as
engineers change designs, methods of analysis or
even personal tastes regarding the looks of computer
output.
This is especially true of the programs used in
the design of nuclear power plants, an area which is
a prime concern with us. In this design area, there
is a continual advance in technology. Consequently,
it naturally follows that the programs used must continually evolve to keep pace.
Numerous Computer Programs

Although a program cannot, as yet, take over the
conceptual design function, nevertheless, used as a
tool for analysis, it can study complex models swiftly, and provide reliable and quick estimates of the
merits of various engineering solutions to a given
problem. Because of this increasing importance, it
is not unusual to find numerous computer programs
being conceived daily to handle the ever-increasing
engineering problems confronting engineering design
firms. Let's follow the evolution of a typical engineering computer program.

Continuing Growth

The next step in the maturation of the newly-born
program is qualification for the problem at hand.
For this, a few examples are run and if solved satisfactorily, the program is officially issued. The
qualification process does not stop at this point
but continues indefinitely, drawing not only from
experience gained through use but also from the interaction between the writers or maintainers of the
program and its users.
The interaction between user and writer is a major factor in the program's growth. Starting with
a model for the engineering problem at hand, the
user and writer team examine it. They decide whether
the program, as written, can solve the problem. This
process of user-writer interaction can serve to qualify the program for a wider set of problems, or disqualify it for certain problems.
Continuing Qualification

The program does not stop evolving after the qualification process by the development team. A continual stream of techniques for refined or improved
analysis calls for continual reevaluation of the computer programs that use the original techniques.
This process of selective change and improvement is
reminiscent of biological evolution; growth, adjustment, atrophy, specialization and breeding are all
present.

Birth of a Program
Biological Analogy

The conception of a new program and its subsequent
gestation generally take place in engineering research
groups; at Sargent & Lundy the analytical divisions
are assigned this task. These divisions may investigate and recommend modification of one of the existing programs or develop a new one.
Validation

For our purposes, let's consider that a new program has been initiated. After it is written and debugged, validation begins. By this process the program is insured of doing what the programmer intends
it to; or in other words, the program is checked for
internal consistency. Known simple calculations may
be used to check for uniformity; or another program
with similar capabilities but with a different approach may be used for verification.

8

The diagram in Figure 1 illustrates this biological analogy. Let's follow the evolution of this
particular program. Version I is the initial stage
of a frame analysis program. Version II is its first
mutation when rigid members and end releases are introduced and a new version is required. With the advent of better methodology, Version III is developed.
This negates the usefulness of Versions I and II. New
requirements imposed by the Atomic Energy Commission
produce yet another stage, Version IV. However, in
this case Version III may still be functional for
some applications and therefore is not discontinued.
In time, Version IV is expanded upon when a particular group in the company requests a version which
will output the results of the program in a format
to suit the special needs of that group; in this
case, a specialized version is written for that
group while the original Version IV is kept intact.
COMPUTERS and PEOPLE for December, 1974

puted by this program. Just as the first ~ffiSS program was continually expanded, so too was the DYNAPIPE program. At present there are four separate
versions.

Merger with
Another Program

A dynamic analysis program created independently
from the ~ffiSS family (named DSASS) is based on the
theory that slabs and walls in nuclear plants can
be modeled by a system of slabs vibrating in their
own plane and interconnected by translational springs
representing the stiffness of the walls. Figure 3
shows a DSASS model.

Guide Tubes

Program Evolution
Figure 1

Then again another group may request that two
types of analysis be performed in one program, such
as static and dynamic analyses. To accomplish this,
it may be necessary to combine two or three programs,
forming a new program. If the company leases a bigger computer that allows for the solving of more
joints and members, an expanded version of the new
program that would take advantage of the size and
speed of the new computer is written.
Thus, the computer program can evolve into many
stages. In numerous instances issuing the first
version of a program is only 20 per cent of the total work.
An Example of Extensive Growth

A typical example of this evolutionary process in
our design group is our MASS program (~atrix Analysis Seismic Stresses). First written in 1965, it
performed dynamic analysis of rigid frames and trusses. Since that time MASS II, MASS III, MASS IV,
and MASS V have been developed to incorporate additional features. The reactor pressure vessel of a
nuclear plant can be modeled to fit into the MASS
program (Figure 2).
A program called DYNAPIPE evolved from the ongInal MASS computer program as a special version to
analyze the dynamic behavior of the piping system.
For example, when a pipe break is postulated, the
response of the pipe during the accident can be comCOMPUTERS and PEOPLE for December, 1974

Dynamic Model of Reactor Pressure Vessel & Internals
Figure 2

Combining the MASS IV and DSASS programs produced
DYNAS, which is used to perform seismic analysis for
coupled structures in a nuclear plant. As shown in
Figure 4, the reactor pressure vessel is modeled as
a system of discrete masses and weightless members,
with its internals connected to the surrounding
slabs and walls.
SLSAP is a modified version of SAP acquired from
a university; it is a general-purpose finite-element
program. It is used to investigate framed structures,
containment structures and sacrificial shields. When
a part of SLSAP was extracted and combined with DYNAPIPE 4, PIPSYS was born. This program was instituted
to perform static and dynamic analysis of three dimensional piping systems, compute the combined stresses, and compare them to the allowable stresses of applicable codes.
In this way has the evolution of the MASS family
occurred during the past seven years. The program
9

712-

14

Slab - Shear Wall

----------/'-------------7
Space Frame

12

~

19

6

10

18..----....

642630 -

17

24

16

23

4

617 -

3

602592-

5

9

2

8

4
3

500 -

560 ~~~~~m~~
Elevation (Ft.)

DSASS Model-Slabs and Shear Walls of
a Turbine-Auxiliary Building
Figure 3

has been expanded many times from its original size;
yet it still possesses the capacity to grow into
other analysis areas.

Combined Building and
Reactor Pressure Vessel Dynamic Model
Figure 4

The Limitations

Although expansion is an important step in achieving a versatile computer program, there should be a
limit to the size of the program for its optimum efficiency at an engineering design office (as distinct
from a software development firm). Programs developed in a design office must remain flexible and readily modifiable. Overly large programs which involve
several writers tend to be difficult to use, difficult to maintain, difficult to modify and with outputs, difficult to interpret.

must know the approximate answer since the slide
rule does not give the decimal point. Although computers do give the decimal point, the instructor's
warning is still true, and we should often remind
ourselves of it.
Knowing the limitations of the computer program
will enhance the success of its growth.
0

"Dinosaurs"

In fact, excessively large programs can run the
risk of being discarded altogether by the user because of their immense size. We call these obese
algorithms dinosaurs. Nature, like some programmers,
may have thought the bigger, the better, when dinosaurs were produced. But when flexibility was important, dinosaurs vanished in a relatively short
time.
Accept with Caution

More important than the limitation of computer
program size is the avoidance of blind acceptance
of the computer's output. When an instructor first
introduced the slide rule to his class he explained
that the simple piece of wood would enable them to
divide, multiply, take square roots, do just about
anything except add. But he then cautioned that they
10

NOTICE
The plates for printing TH E COM PUTE R D I RECTO RY
AND BUYERS' GUIDE, 1974, have been at the printer
and waiting to run on his presses since early September,
while the printer waits for the delivery of promised paper. As of Nov. 13 the printer was still waiting. We regret very much this delay - which is outside of our possibilities of control.
To partially compensate for this delay, any purchaser
of the 1974 directory may order a copy of the 1973 directory at half price ($9.25 instead of $18.50). Prepayment is necessary.
Edmund C. Berkeley, Editor

COMPUTERS and PEOPLE for December. 1974

The Radiation from Computers Into Everywhere
Neil Macdonald, Survey Editor
"Computers and People"

"Dear #067-12-3948*: You are in danger. We don't know who you are but the
government does. They've got your number and they're not the only ones. "

1. From Society of Manufacturing Engineers
20501 Ford Road
Dearborn, MI 48128

How industry is using computer-aided technology
to obtain good economic results will be emphasized
at the third Computer-Aided Design and Computer-Aided
Manufacturing Conference and Exposition. This is
sponsored by the Society of Manufacturing Engineers
at the Hyatt Regency O'Hare Hotel in Chicago February 10-13, 1975. Nine Conference sessions and demonstrations of computer-based equipment, systems, and
software used in industrial applications will comprise CAD/CAM III.
More than 1,000 industrialists, manufacturing executives, and engineers responsible for computerbased industrial and manufacturing operations are
expected to attend.
2. From Association for Computing Machinery
1133 Avenue of the Americas
New York, NY 10036

The Association for Computing Machinery announces
a new quarterly, ACM TRANSACTIONS ON MATHEMATICAL
SOFTWARE (TOMS). The first issue is scheduled for
March, 1975.
This quarterly will publish significant research
and development results in the area of fundamental
mathematical algorithms and associated software (computer programs). Papers and other items will have
natural importance and relevance to mathematical software and they will support significant areas of computer application. The content of papers in those
areas that are primarily applications will be relevant to a reasonably wide class of problems and not
just to the specific considerations that motivated
the paper. There will be increasing emphasis on
utilitarian values of programs.
3. From David L. Emerick
Association of Computer Time-Sharing Users
c/o Borg Warner Chemicals
Borg Warner Corporation
Parkersburg, WV 26101

Computer time-sharing users are being invited to
join a new non-profit professional association, The
Association of Computer Time-Sharing Users, dubbed
"ACTSU." The stated purpose of the association is
"the evaluation, comparison and improvement of the

services offered by the time-sharing industry."
The Association will seek to help time-sharing
users. Comprehensive industry surveys are planned,
to provide members with comparisons and evaluations
of the services offered by time-sharing companies.
Some of the aspects that the industry surveys will
cover include: processing costs, operating characteristics, pre-programmed packages, frequency of
down-time, quality of technical support, geographical coverage, liability under service contracts,
and quality of educational materials.
Interested persons are urged to write ACTSU, 210
Fifth Avenue, New York, N.Y. 10010 or to telephone
Hillel Segal (212) 752-2000, Ext. 8379, for additional information and membership applications.
4. From Karen A. Duncan
Association for the Development of Computer-Based
Instructional Systems (ADCIS)
c/o Office of Computer Resources
College of Dental Medicine
80 Barnes St.
Charleston, SC 29401

The 1975 Winter Conference of the Association for
the Development of Computer-Based Instructional Systems is sponsored by this college, and will take
place here January 28-30, 1975.
Persons interested in computer-assisted instruction or computer-managed instruction are invited.
This conference provides a professional arena for
the sharing of research findings, operational notes,
theories, educational strategies and developments
regarding CAl and CMI. Commercial and noncommercial
groups are invited to discuss their release policies
and potential ways in which courseware may be shared.
5. From Civil Liberties Union of Massachusetts
3 Joy St.
Boston, MA 02108

Dear u067-12-3948*:
You are in danger.
We don't know who you are, but the government does.
They've got your number and they're not the only ones.
Your bank has it, and so does your insurance company,
your credit card company, and even the Registry of
(please turn to page 29)
*This is a fictitious number.

COMPUTERS and PEOPLE for December, 1974

11

The Computer Industry and Unionization
A. A. Imberman
Imberman and De Forest
Consultants to Management
209 South LaSalle St.
Chicago, III. 60604

"The most painful way to learn about unionization is to lose
a National Labor Relations Board election. "

The Computer Field: Ripe for Unionization?

Can the computer industry grow and expand in production and sales without experiencing some problems
with labor? The rising tide of strikes (in unionized plants producing computer hardware), and of
union organizing campaigns in the non-union plants,
is some indication of what lies ahead.
The computer industry is expected to chalk up new
performance records this year, with shipments exceeding $10 billion. A 10% in~rease is forecast, in
response to strong demands both in the United States
and abroad. Industry revenues are currently growing even more rapidly than shipments. In part, this
differential reflects the relatively slow pace of
trade-ins of third generation equipment in connection with the purchase of new computers. Additionally, despite stiff borrowing costs, manufacturers
are experiencing a higher than usual percentage of
outright sales and a corresponding decline in direct
leasing. Helping to account for this shift are gains
in third-party leasing and the popularity of less expensive mini-computers.
The computer industry's success in maintaining
impressive growth largely reflects an impressive
ability to achieve continuing advances in hardware.
In particular, rapid strides in semiconductor technology have led to significant improvements in computer memory capacities and operating speeds while,
at the same time, enabling manufacturers to reduce
prices. All of these factors indicate eventual labor union activities.
212 Union Victories

In the last four years, I have analyzed 212 union
victories in representation elections in a whole variety of industries. Of the 212 companies, 9 were
in the professional, scientific and controlling instruments (manufacturing) industry. I found that
timely precautions might have prevented most of
these union victories. How the trend had gone in
the professional, scientific and controlling instruments industry might be judged from the accompanying
table. The guideline controls have had some hampering influence on union activity.
As a result of our comprehensive study, these
conclusions became evident:
1. Most elections in which wages and hours were
alleged to be the main issue (which accounted for
12

~. A. Imberman did his undergraduate work at
New York Univ., and his graduate work at Johns
Hopkins. He has directed the Management Seminar
at the Univ. of Chicago and Illinois Institute of
Technology for over 20 years. He has written
widely, and is an employee relations consultant
to major companies, including Dupont, Avis, McGraw Edison, Sears Roebuck, and many others.

about 60 per cent of the elections), were won by
the unions because of employee ignorance of the competitive situation of the company. Employer speeches
in the election period had no effect. They were too
late.
2. Most complaints about working conditions (a
basic cause of nearly 30 per cent of the elections)
were well-founded and reflected real issues. Election speeches had no effect here either.
3. Most elections in which arbitrary, tyrannical
and abusive supervisors were specifically named, were
truly the result of poor supervisory methods. More
than 50 per cent of the elections involved his issue.
The most painful way to learn about unionization
is to lose a National Labor Relations Board election.
Yet even with disputes over money, almost all labor
unrest could have been quelled before unions took
control of the work force. How? By setting up a
two-way communications system, and training supervisors in modern management methods.
Failure to Listen to Employees

A typical example of this lack of two-way communications -- this failure to listen to employees -taken from 39 of these 212 election situations, is
the case history of a single department in an East
Coast plant in this industry (professional, scientific and controlling instruments -- manufacturing).
The department had developed troubles that led to
an election.
This was a basic department on which other production departments depended. Within the past year
its quality of work had deteriorated. Production
schedules seemed too often to be out of gear with
the rest of the plant. Union organization in the
COMPUTERS and PEOPLE for December, 1974

Professional, Scientific and Controlling
I nstruments (Manufacturing)
Fiscal
Year

s

Number of NLRB
Elections Held

Number Won
By Unions

Opinion Polls

Percent Won
By Unions

1973
1972
1971
1970
1969

67
62
46
51
62

35
29
14
17
26

52.2
46.7
30.4
33.3
41.9

1968
1967
1966

68
48
59

35
21
31

51.4
43.7
52.5

Source:

National Labor Relations Board Reports.

plant had been led by employees from this basic department.

s

~

The plant manager had talked with the department
supervisor a number of times. The answer was more
or less the same: employees in the department were
quarrelling, there were bitter disputes over who was
to be favored with overtime and Saturday work, squabbles over department seniority, some hard feeling
over wage differentials, and general distrust of
management. None of this had been true before.
What was worse, there was nothing that management
could put its finger on, to correct, even after the
election.
The Supervisor's Health
Called in to advise the company on how to deal
with the growing absenteeism and turnover in the
plant, I elicited some interesting information from
the employees in that department which went far to
explain the election result.
After a number of weeks of interviews, it seemed
to me that the trouble seemed to revolve around the
department supervisor himself. One of the troubles
mentioned by all employees in the department was the
harshness of the supervisor. He was unreasonable,
tyrannical, arbitrary, hard to get along with. Since
he had been with the company for about 15 years, and
the complaints were recent in origin, I decided to
talk with him.
Heat and Cold
It was discovered that he had arthritis, and I
recommended that the supervisor be sent to a physician. Since his department was in a colder part of
the plant, his arthritic pain was accentuated by lack
of heat. This affected his whole disposition and
actions towards his employees.
Brought to the company's attention, a new foreman was assigned to that department. The older foreman was transferred to another department where room
temperatures were much higher. Within three months,
the trouble in the basic department cleared up. The
old foreman -- in the new "hot" department -- was
like a changed man. But the company had already
lost the election.
No amount of veiled promises or threats in speeches to employees during the election period could have
any effect on this situation. Only careful listening to the employees to uncover the roots of the discontent would have had any beneficial effect.

COMPUTERS and PEOPLE for December, 1974

Hundreds of other managements try questionnaires,
polls, "employee audits," suggestion boxes, etc., in
their search for easy information about worker discontent. Yet complaints remain.
For example, of the 212 election situations investigated, some 49 were similar to the case of a
Midwest company in this industry. The company tried
an "opinion poll" questionnaire as a possible solution for its employee gripes, even installing suggestion boxes. These suggestion boxes were designed to give employees a chance to write anonymously
about pet gripes. The plan met with disappointment.
The questionnaire uncovered only general worker complaints; little of it was news to management and
none of it was of any help in finding or pinpointing
solutions. The suggestion box was crammed with silly, unconstructive criticism, sometimes quite vicious.
Lack of Explanation
The problem of still another Southwest company in
this industry comes to mind. Difficulties arose
when this plant mushroomed from a small operation
to that of a larger plant. Where the same executives
had experienced no labor unrest when the facility
was small, they had an alarming amount of it as the
plant expanded. Despite an elaborate "employee audit" and questionnaire, an election petition was
filed with the NLRB and voting was held soon afterwards. The company lost by a narrow margin. Wage
rates were the alleged reason.
Called in by the parent corporation to make a
detailed investigation, I soon uncovered the fact
that most of the difficulties stemmed from rapid
changes in production methods coupled with intolerant, abusive supervisors. These production changes of course, were necessary because of changes in
design, but nobody bothered explaining these things
to employees. They were merely switched from one
production method to another, and since they were
being paid good rates, management felt that the employees merely had to comply with orders.
Resistance, to Change
Unfortunately, most semi-skilled workers, after
learning one or two operations, become frustrated
when those operations are changed without proper
explanation of the cause and without the help of
patient, trained foremen. This frustration works
itself out in various complaints about many things,
and eventually, if enough employees in the plant
feel the same way, there is a blow-up.
After long experience, and careful evaluation of
the 49 similar instances, I concluded that paperand-pencil questionnaires and suggestion boxes for
blue collar workers cannot take the place of manto-man contact in the plant. A systematic procedure
recognized as representing top management, must be
used to listen regularly to employees, and to act
upon the gripes.
Too Simple a Prescription?
So simple and elementary is this prescription
that every reader who manages a factory will immediately snort in derision. Every employer in this
industry believes that he listens to his employees
and that his foremen are well trained.

13

Unfortunately, most employers, with the utmost
good will in the world, do not have the patience to
listen, or the time, or the systematic machinery.
They therefore depend upon personnel department people and more particularly, on foremen and line supervisors to listen. Very few of these people know how
to listen "with the third ear," a talent which can
be developed by training.
Moreover, very few of these management people can
be depended upon to give management a straightforward report on what employees are saying -- not that
personnel department people, foremen, line supervisors, et al. wish to deceive the front office. On
the contrary, most often they are wholeheartedly on
management's side.
But most of these people (consciously or unconsciously) report only what they LIKE to report, or
report only what THEY think is important. Often this
is not the whole story, even if employees gave them
the whole story, which they rarely do.
Listening to employees is also a way for employers to forestall union organizers who roam smaller
communities of every state, seeking plants to organize. Once organized, union officials believe, the
employees are locked into the union for years and
years. How often does a decertification election
succeed? Not too often.
Union Tactics

One common attack by union organizers is to visit
employees in their homes and promise them all sorts
of pie in the sky. The organizers don't have to
deliver anything. Under the law they can promise
anything they like. If their promises don't work
out, it's the selfish employer's fault. And the
trouble continues.
What can employers do? For this sort of common
tactic, there is only one weapon: LISTEN TO THE
EMPLOYEE and train your supervisors. There is no
other way that an employer can find out just what
is troubling his employees, or what he must do to
overcome the difficulties on which union organizers
build.
Center of Trouble on 3rd or 4th Floor

Another example, from about 21 similar cases covered in this study, might be of interest here. It
was a California company in this industry. The hotbed of union sentiment seemed to be centered on the
third of the four floors of the plant. There seemed
no obvious reason, yet judicious and cautious interviewing of employees throughout the plant led a skilled consultant interviewer to uncover some interesting facts.
No Refrigerator

The first, second, and fourth floors had small
refrigerators in the employee's restrooms. The women brought their lunches and deposited the bags in
the refrigerators. But the women on the third floor
had no refrigerator. Theirs had broken down a year
ago, and had never been repaired. They used the
second or fourth floor refrigerators. By so doing,
their lunch bags were often pushed aside by the employees of the other floors; sometimes, if there
wasn't enough room, the third floor lunch bags were
removed from the refrigerators entirely. They had
complained to their foremen over and over, but the
foremen were too busy to raise the question with the
plant manager.

Now it is difficult to believe that anything so
trivial would heat up a group of about 80 employees,
yet such was the fact. From this small beginning,
festering for about a year, 80 employees became dissatisfied with everything -- the ventilation in the
plant, the location of the overhead lights, the
treatment they received from supervisors, wage rates,
etc. Everything the company did, was bad, bad, bad.
From this humble beginning, employee dissatisfaction
spread through the plant. Not a single foreman had
tried to deal with the situation, or reported it
higher up.
It took seven weeks of careful interviewing, careful listening, and running down of all clues, to uncover this basic trivial cause. Installation of a
$80 renovated refrigerator in the third floor restroom cleared up most of the difficulty.
Could the company have uncovered clues indicating that lack of a refrigerator to hold employee
lunch bags on the third floor was causing a severe
shift in employee sentiment? Without foremen trained to listen and report, the only other alternative
would be to talk to every employee in the plant.
Troublesome as that might have been, it doesn't compare with the subsequent trouble (and expense) of
dealing with a union.
"Trained Ear" Gets Results

It takes special training and special techniques
to invite and enjoy the confidence of employees.
(Here and there throughout the country are some
skilled consultants, who specialize in such labormanagement techniques. Usually, these men are connected with a college or university. Interested
company executives might secure a list of recommended names by writing to the University Research Center, 121 West Adams, Chicago, Illinois 60603.)
Sudden Labor Trouble

Here is another case from our study which somewhat parallels 32 others. About 300 men were involved. A 70-year-old company in this industry,
with no labor or union trouble history, suddenly
found itself facing an organization drive. The company wage scale was in line with that of the community -- yet suddenly men in the plant seemed to
be swallowing all sorts of union organizer promises
-- something they had never done before. Why the
sudden labor trouble?
In this small town, no other company had a union,
yet somehow the union seemed to have gathered strength in this plant. The company won the election by
a very slim majority, and then as a result of unfair
labor charges, another election was ordered. However, in the interim, the company had used an outside consultant who did nothing but interview and
listen to employees, and provide training for supervisors.
Hearing Loss?

The basis of his findings was the noise in one
department that caused a number of employees to
fear hearing loss. This was mainly a reaction to
the current publicity about OSHA legislation, on
which the union organizer capitalized. Those employees who complained had merely been given uncomfortable ear plugs without explanation -- a sort of
impersonal treatment which many resented. This resentment cropped up in complaints about many other
working conditions -- formerly accepted as a matter
(please turn to page 25)

14

COMPUTERS and PEOPLE for December, 1974

Changing Technology and Medical Speciali,zation
Ray M. Antley, M.D.
Department of Medical Genetics
Indiana Univ. School of Medicine
Indianapolis, Ind. 46202

i
r

and

..

Mary Ann Antley, M.A.
Department of English
Indiana Univ.-Purdue Univ. at Indianapolis
Indianapolis, Ind. 46202
"The process of data collecting by computers will cause interaction
between the technology and the illness which it is designed to diagnose and treat, and these changes will result in computers performing not old jobs better but completely new jobs. "

i-

Twenty-Five Years of Computers in Medicine

Twenty-five years of computers, and computers in
medicine, bring us to the threshold of their accelerated introduction into clinical medicine. To date,
there has been an opportunistic application of computers to medicine. This unstructured approach is
about to change, however, (1) because of the technological advances which have been achieved through
computer research and are ready for utilization, and
(2) because of the developments in concepts of comprehensive health care and its delivery. People who
have had little or no care, people who have had partial care through some form of insurance, and people
who have been able to afford total care, are collectively, either through insurance, through unions, or
through government health programs, demanding comprehensive health care at moderate cost to modest cost.
The dual problems of obtaining manpower to staff such
a health service and of keeping the total cost of
that service as low as possible, lend themselves to
solutions through technology.

r.

Evolution of Technology

The developments in technology act in concert with
the recognition of the need for expanded medical care.
They are compounded by the existing doctor shortage.
These powerful interacting forces will structure the
future application and development of automation in
medicine. These forces have thus far tended to channel technological application towards assisting the
primary physician in the delivery of health care.

I,

·10

Furthermore, the evolution of technology is such
that this assisting phase will be transient, for programs are already being developed which will do much
of what the physician does now. Finally, the process
of data collecting by computers will cause interactions between the technology and the substrate of illness which it is designed to diagnose and treat, an
these changes will result in computers performing no
old jobs better, but completely new jobs •
_____

V

This article seeks to explore the evolution of
machines in medicine and to discuss some of the problems inherent in change. We have divided the evolution in medical technology into three phases based
upon inferences about the role of the physician in
relationship to his machines and his patients. Phase
I is called the assisting phase; Phase II, the automated phase; and Phase III, the environmental control
phase. After each phase we have attempted to indiCOMPUTERS and PEOPLE for December, 1974

cate some of the consequences of the different
stages. It should be apparent that different levels of the progression are occurring simultaneously
and that there is no sharp demarkation between phases. What might not be apparent is that Phase II
should be a reality in the next decade and that
Phase III will probably be the dominant form of
medical practice within the career of present day
medical students.
Phase I - The Assisting Phase

The introduction of technology into medicine has
been at such a rate that each new machine has been
seen as an individual innovation which helps with
a particular diagnostic or treatment function. When
a new machine appears, it is tested and incorporated into the doctor's routine on the basis of its
utility and efficiency. This random incorporation
of such innovations as the electrocardiogram (ECG),
the electroencephalogram (EEG), the fiber gastroscope, the heart-lung machine and patient monitoring equipment throughout all fields of medicine has
obscured the collective impact on medical practice
of machines, i.e., the channelling of medical practice toward technological specialties. The phenomena of medical specialization has been largely attributed to an increased work load and to the information explosion. This hypothesis, however,
misses the important relationship between the development of a machine and the development of information and a specialty as a direct result of
that machine.
The Electrocardiogram and the Cardiologist

For example, the introduction of the electrocardiogram did much to strengthen the cardiologist -who was previously solely organ based. The ECG
established scientific credibility to the diagnosis
and treatment of myocardial infarction syndrome.
Second, a literature developed about the technical
aspects of the ECG machine itself, followed by a
literal explosion of information about ECG diagnosis.
Each diagnosis has usually been enhanced by reports
related to prognosis and treatment to such an extent
that it becomes a full time job keeping abreast of
the publications in this field alone.
Although more has gone into the development
of cardiology than the ECG, it is hard to conceive
of that specialty without it. From this beginning
there has been a proliferation of other innovations:
15

the intensive care units, specialists in intensive
care, respiration therapists, second generation machines like pace makers and cardiac monitors. As
technology provides equipment to investigate a particular organ system in depth, a new information explosion and subsequent specialty frequently develops.
Thus, the new technology's effects have been to improve medicine through specialization, to increase
its complexity, and to heighten its intellectual
stimulation related to content.
New Innovations in Machines

Relatively recent innovated machines are in the
laboratory, the nursery, the intensive care unit,
the emergency room and the operating room. They
pervade the care of the critically ill inpatient.
They structure the clinic's business procedures if
not influencing the individual doctor's practice procedures.
It is significant that, in addition to helping
the doctor do what he did before, these machines do
jobs which really cannot be equaled by the physician
alone. Increasingly, machines are molding the way
in which medicine is practiced, even to the extent
of having influence over the formulation of medical
ethics in regard to the definition of death. This
same technology, by its very existence, raises extremely perplexing questions about who will die.
Dependence of the Doctor on Machines

The introduction of technology into medicine has
several effects upon the doctor. One is that in
routine practice, the doctor has unconsciously become dependent on the laboratory, x-ray, drugs packaged by automated systems and various electronic instruments to such an extent that the practice of
medicine would be starkly different if they were
suddenly removed. By examining the prospects of
their removal, one is able to develop some feel for
the amount of evolution they have induced. Also, a
forward anticipation of comparable change in the
next ten years to what we have had in the past 25
years is helpful in grasping the magnitude and rates
of change we will experience.
Changes in Medical Practice

Thus, these machines, which have been readily acquired and used by the medical profession to help
them perform tasks and detect disease more quickly
and accurately, have subtly effected a change in the
environment of medical practice in the twentieth century.
A change in the environment is rarely only
additive or linear. You seldom, if ever,
have an old environment PLUS a new element,
such as a printing press or an ele~tric plug;
what you have is a totally new envIronment. l
From the individual family doctor of the early
1900's who treated a patient for all his illnesses,
practice has evolved in a predictable technological
form into a system in which many specialists treat
specific diseases that manifest themselves in the
same patient. This evolution from patient-centered
to disease-centered treatment has taken place gradually over the past 70 years. The rate of change
has been slow enough to allow for the training of
new physicians in the new specialties created by an
expanding medical technology. The very real changes
in the role of the physician and the system of health
delivery that have occurred have been effected with
relatively little trauma to the earlier physicians
16

who have been able to continue their roles as generalists in an increasingly specialized world. Medicine has adjusted to the presence of technology and
now reflects its qualities so smoothly and so completely that it requires a detached view to even recognize the great change in orientation that has occurred.
Phase II - The Automated Phase

Now, into this seemingly stabilized system of
health delivery care based on scientific, technological specialization, a different sort of machine
is being introduced. Its long term effects will result in another major change in the environment of
medical practice. These are automated machines that
are capable of replacing those functions which have
so far been performed only by the physician himself.
Because the physician has become conditioned to accepting technology in medicine, these more sophisticated instruments have been introduced without arousing questions about their long-term implications, or,
more often, without even a recognition of what these
implications are.
A computer-acquired history and a programmed physical examination are today almost existing realities. 2 ,3,4,5 Machines which will perform a physical
examination by analyzing data coming directly from
self-propelled sensing devices are projected at
this time. Once the software has been developed,
the retrieval of data from medical records, along
with results from automated clinical laboratories,
and the integration of these data for processing by
a computer will be simple procedures. The import
from the capabilities of these existing and realistically projected machines is that they are, and
will be, able to do what the physician now does.
Here again, as in 1900, the role of the physicianwill be affected and the present system of health
delivery will restructure itself around a new concept in patient care. But this change will be unlike the gradual readjustment that accrued when medicine entered the technological era. Because of the
productive capacity of our electronics industry, the
lead time between the development of an automated
process in health delivery care and the moment when
widespread change occurs will be short, that is
years, not decades. The resulting effect on the
physician will be one of frequent and significant
change in his role. Trained as a specialist in
disease detection he will be confronted with machines that are equally specialized, that can also
differentiate diseases, and that will bring to this
process a degree of efficiency and a capability for
information storage far beyond human abilities.
"Future Shock" for the Physician

Thus, as in so many other fields that have become automated, the physician will experience not
.the introduction of new techniques which can coexist with his present job, but the actual replac~­
ment of much of his present function by a machine.
The years of training in scientific disease detec- '
tion and the old methods of specialist-based health
care delivery will have been made, in large measure,
obsolete. He will, in fact, experience "future
shock".
Future shock occurs when you are confronted by
the fact that the world you were educated to
believe in doesn't exist. Your images of reality are apparitions that disappear on contact. There are several ways of responding
to such a condition, one of which is to withCOMPUTERS and PEOPLE for December, 1974

draw and allow oneself to be overcome by a
sense of impotence. More commonly, one continues to act as if his apparitions were substantial, relentlessly pursuing a course of
action that he knows will fail him.l
A third reaction to being suddenly exposed to a
new environment is to rationally evaluate your situation and adjust to the demands of the new milieu.
In order to make this reorientation, the physician
will first need to recognize that there is a new
environment. Then he will need to have the flexibility necessary to adapt to the new roles which the
doctor will fulfill in a world of automated medicine.
Some of these roles will be in the new specialties,
created by the machines once more; others will be in
computer administration and programming; many more
will be connected with counseling patients and responding to their illnesses with empathy. There
are many variations within these categories. The
important thing is for the physician today to recognize the change which is going on in medicine and
automation so that he will be prepared for the new
demands which will follow.
Phase III - The Environmental Control Phase

The development of machines which are able to
replace hitherto unique diagnostic functions of the
physician is only the intermediary phase in the evolution of machines in medicine. Rapidly following
this era will come the stage in which heuristic computers interact to develop strategies for medical
care which are peculiarly suitable to the abilities
of technology rather than to human organization.
Changes in information about the illness and the
alterations in disease caused by the automation \~ill
result in changes not only in functions related to
diagnosis and treatment, but also in the goals of
medical care.

.

Perhaps the first goal of automated medical care
should be to treat a sick person, and this would
shift to prevention of illness, and in time this
might change to maintaining an equilibrium between
birth and death rates. These goals will undoubtedly
be altered from time to time by the needs of society.
At this point, the computer may be assigned a task
and the assigner not know how the computer arrived
at an answer, but only that it arrived at a carefully
planned answer, perhaps making calculations and trials that it would take an individual 100 or more years
to duplicate. This later phase of automation will be
characterized by two new facets as described by John
Diebold: (1) Technological advances are self-generating. "No longer must technological progress wait
on the next individual scientific discovery: technology itself is pushing research into new discoveries and new dimensions."

troduced mechanism, but under the external direction
of the machine itself. For example, in a world whose
goals are a healthy population, the emphasis of medicine in the future may well be on prevention rather
than diagnosis and treatment. With the precedent
for using machines in problem solving situations
firmly established, and with the concurrent development of machines that can devise strategy in the
pursuit of goals,6 it is predictable that these computers will be used in problem solving situations in
health delivery. We predict that their recommended
approaches to health delivery problems will influence the direction that medicine takes in the next
decade.
Thus far, the three phases of the evolution of
machines in medicine have been delineated. It may
be seen that the first phase, in which machines as~
sist the physician, is evolving into Phase II, in
which machines are designed to replace functions
which heretofore had been unique to the role of the
physician. It may also be seen that this second
phase is only intermediary in a progression that
will result in machines themselves being used to
devise new approaches to health care. Thus, technology continues to shape the direction of medical
practice through its increasing incorporation into
diagnosis and treatment. The development of new
skills by physicians in response to technical advancement will be necessary, while appropriate education in medical school should facilitate this adaptive development.
Culture Influencing the Physician

The preceding discussion has demonstrated that
the physician is influenced both subtly and overtly
by the culture in which he lives. At the present
time that culture is technological, and both the
practice of medicine and the job of the physician
are inseparably chained to that technology. Technological advances, such as the ECG, which have created new jobs and new fields of medicine are examples of this interdependency upon technology in medicine today. In like manner, it may be assumed that
new machines will continue to structure new specialties and define new jobs in the future.
Therefore, because of what has happened in the
past twenty years and is continuing, predictions
can be made about the effect of technological advances on the role of the physician in the future.
Finally, with these changes in mind it is possible
to suggest some changes in the present medical education system that will be necessary in order to
prepare physicians to practice medicine in an increasingly automated environment.
Changes in Medical Education

v

This process will produce whole new sets of computers which will acquire, store, and process information which only the machine through its own processes evaluated as being relevant to treatment and
health to begin wi th -- wholly a machine idea. (2)
Computers rather than being given a defined task to
perform, can be assigned a goal, the computer at this
highest point of machine intelligence will pursue a
goal with minimum instruction, devising its own strategy in pursuit of that goal. 6
_
Direction Determined by the Machine

In this final stage, machines will again be responsible for a changed environment in medicine, but
this time the change will occur not through the restructuring of the present system around a newly inCOMPUTERS and PEOPLE for December, 1974

Among the possibilities that cluster around the
role of the physician in the late twentieth century,
two large areas may be emphasized. Some doctors
will need to become advanced technologists in order
to conceive, design, operate, and understand the
new generations of machines. Secondly, with the
increased use of machines for technical functions,
many physicians will be called upon to help the patient understand the technical findings of his examination and to facilitate the constructive use of
this information in the patient's life. The genetic
counselor already serves this function today, helping
the counselee to incorporate the information that he
has acquired in the counseling session for constructive planning; while the thanoto!ogist works with
terminally ill patients as they deal with the knowledge of thei r approachi ng dea tli· I
rp case turn to page 25)
17

WATERGATE SOUTH
Nancy A. Miller
16 Ober Road
Princeton, NJ 08540

"In Fayetteville, Arkansas, I was working with Vietnam Veterans Against the War. One of
the veterans there, William W. Lemmer, turned out to be an FBI informer. ... We broke
his cover and exposed him. He immediately suggested he become a double agent on the FBI."

Introduction

Investigations by the press, Congressional committees, and the courts have slowly revealed the
nature of "Watergate East" and "Watergate West."
The first refers to efforts to undermine Democratic
Party presidential candidates and the subsequent
cover-up; the second, Watergate West, to the violation of the rights of Dr. Lewis Fielding in an attempt to seal off leaks. The inter-relationship between Watergates East and West is rather ambiguous
without an examination of "Watergate South," which
has been almost totally overlooked. The evidence
supporting the hypothesis that there was a southern
extension is scattered through Ervin Committee testimony, press statements, affidavits and depositions
filed in several courts, and other statements by
some of those involved. Many clues or references
may still lie undetected, but a consistent picture
has emerged, from those that have been found, of an
attempt to keep Richard M. Nixon in the White House
at almost any cost.
I first stumbled into Watergate South in a most
unlikely place, Fayetteville, Arkansas. I was living there in the spring of 1972 and working with the
Vietnam Veterans Against the War (VVAW). One of the
veterans there, William W. Lemmer, turned out to be
an FBI informer. It was through him that several of
us began to learn of what was being planned for that
presidential election year. In late May, 1972, we
broke Lemmer's cover and exposed him as an informer.
He immediately suggested that he become a double
agent, spying on the FBI. To prove the good faith
of his offer, he voluntarily agreed to be interviewed, on tape, by two other Fayetteville veterans. The
interview was conducted on June 3 and 4, two weeks
before the discovery of the Watergate break-ins. I
was present during the second day's session, when
Lemmer made his most ominous statements.
Assertions that Violence Was Planned
for the 1972 Political Conventions

Watergates East and West reveal an hysterical attempt to seal the White House off from the rest of
the country. But why the hysteria? Why the frantic
cover-up? Much of the answer lies in Watergate South.
Even the most cooperative witnesses have shied away
from this area of the total puzzle, probably because
its implications are so staggering. James W. McCord,
Jr., came close to it when he was testifying before
the Ervin Committee in May of 1973. He stated that

18

he believed he had acted in the nation's best interest because of plans allegedly being made by groups,
working with the Democrats, to violently disrupt the
conventions. Therefore, telephone taps of Democratic committee members were necessary to learn of
plans in time to head off the trouble makers. McCord testified to receiving "almost daily" reports
from the Internal Security Division of the Justice
Department, some of which linked the Democratic Party to VVAW. One of those reports
came concurrently with some other information
that that same group (VVAW) was planning violence at the Republican National Convention
involving danger to, threats to life of individuals. • • • The Vietnam Veterans Against
the War was one violence-oriented group that
was already saying in the spring of 1972 that
they were going to cause destruction to life
and property at the August Republican convention, using in their own words, their own bodies and weapons as the spearhead of the attack
there -- these are their exact words, and some
of them (the Gainesville 8) have since been
indicted in Tallahassee, Florida, with additional plans to damage the life and property
of the convention. l
Earlier, during the trial of the Watergate burglars in January, 1973, one of McCord's attorneys,
Gerald Alch, explained the rationale of this defense.
If one is under a reasonable apprehension -regardless of whether that apprehension is in
fact correct -- he is justified in breaking a
law to avoid the greater harm, which in this
case would be violence directed to Republican
officials, including but not limited to, the
President. 2
The first question that needs to be asked is:
did McCord have cause for a "reasonable apprehension" that violence was planned for the 1972 conventions? The answer to this question seems to be:
yes, violence was planned. The proof of this answer
is found in the tangled web of a second question:
who was planning to initiate and direct the violence?
Questionable Nature of Internal Security Division
Information Supporting Charges Against VVAW

The government alleged that VVAW members conspired
to be the instigators of the violence. The source
COMPUTERS and PEOPLE for December, 1974

f iI'

1,/

and veracity of these allegations, however, is highly questionable. The "New York Times" spoke with a
highly placed Florida law enforcement official
who participated in the security planning and
operation for both conventions and saw the toplevel intelligence reports (who) said in an
interview last August (1972) that there was
no mention in the intelligence reports of the
plot described by the Government in its indictment (of the Gainesville 8).
After checking the intelligence reports for
the security operation again to refresh his
memory, the source repeated that the strongest
warning about any potential activities of the
V.V.A.W. was a report that it had bought "between five and one-hundred slingshots."
And a check of the secret intelligence and operation logs of the Dade County Public Safety
Department, made available to the New York
Times, also shows no signs of Federal, state
and local reports of the alleged plot. 3
At least two undercover officers with the Dade
County Public Safety Department, Gerald Rudoff and
Harrison Crenshaw, had infiltrated VVAW as informers
and had attended VVAW meetings in the Miami area
prior to the conventions. Had they heard of any
plans that could be construed as potentially disruptive, surely Rudoff and Crenshaw would have reported them. These reports should have been among
the materials available to the Florida law enforcement official if he and his co-workers were to be
able to maintain order and to protect the lives of
those present in and around the conventions. The
use of informants is based upon the need to fulfill
such responsibilities. In view of the absence of
such reports, it is reasonable to assume that there
had been no indications that VVAW, or any other
movement group, was planning to incite violence.
Facts tend to support this contention.
Convention Disruptions Started by People
Apparently Not in the Peace Movement

VVAW was the only movement organization whose
members were indicted for conspiring to violently
disrupt either convention. It was also the only
group mentioned by McCord in his testimony as being
a source of concern to security personnel at the
conventions.
Aside from sporadic trashing and a disorganized
skirmish the last night of the Republican Convention,
there was no violence at either. That incident the
final night involved little more than blocking traffic, which is far from the blowing up of the Causeway to Miami Beach, of police stations, and of communications installations that the Gainesville 8
were charged with planning. Of the 1,200 demonstrators arrested that night, only a few -- some reports
say no -- VVAW members were arrested.
Several times people in Miami Beach noticed that
groups of younger demonstrators were roused to start
trashing by agitators who quickly faded from view
when the trouble started. Some of these instigators
may have been irrational hotheads from the ranks of
the movement, but not all of them were. A reporter
for the "Miami Herald"
saw two pro-Nixon youths physically disrupt a
anti-war demonstration outside convention hall. One of the young men identified
himself as Stephen McNellis, Minnesota coordi-

\~omen's

d

COMPUTERS and PEOPLE for December, 1974

nator for VVJP (Vietnam Veterans for a Just
Peace) . • • •
Since then, as part of the Watergate disclosures, the White House has admitted that the
pro-Nixon veterans group (VVJP) was in fact
financed with GOP campaign funds and directed
by Charles Colson. 4
No Government Case to Support Indictment
of the Gainesville 8

Sizable contingents of VVAW members were present
at both conventions, yet the expected violence did
not occur. It is conceivable, if the charges against
the Gainesville 8 were true, that VVAW abandoned its
plans for the August convention after some of its
members were indicted in July. However, the jury
found the eight defendants innocent of all charges
after hearing a month of prosecution witnesses,
only one defense witness, and after deliberating
for only four hours. Obviously, the government had
no case to support its charges, despite the fact
that VVAW was heavily infiltrated. Two FBI informers, Lemmer and Karl Becker, were present during the
meetings from which the indictment was derived. Another FBI informer, Emerson L. Poe, was working closely with the Florida VVAW coordinator, Scott Camil,
who was later indicted as one of the Gainesville 8.
Rudoff and Crenshaw were working on the local level
in Miami with Camil and Alton C. Foss, another defendant. All but Rudoff testified at the trial and
still the government had no case. The only assumption that can possibly be drawn is that there was no
conspiracy by VVAW members to initiate violence at
the conventions.
If violence was planned, but it was not planned
by the VVAW, then others must have done so. If
other movement groups had, then the indictment of
the Gainesville 8 would not have inhibited them.
They might even have assumed that they were not under heavy surveillance and, therefore, were free to
do as they wished, with a fair degree of assurance
that they would escape blame since others had already been charged with what they planned to do.
The absence of any serious outbursts is indicative
of the peaceful intentions of the demonstrators.
This fact, together with the questionable activities
of members of such groups as the pro-Nixon VVJP, support the belief that the conspirators were not among
the sincere protestors.
The Case Against the Government
The Gainesville Meeting

Adding still further credence to this possibility
are two examples of government involvement through
the FBI. First, the so called Gainesville meeting,
from which most of the indictment against the 8 was
derived, was set up by Becker. Donald C. Donner, a
veteran from Fayetteville, Arkansas, who had undertaken the responsibility of arranging for the meeting, got so far as sending out a letter asking for
suggestions on a date and place to meet before Becker took over. As Donner said:
The meeting was apparently set up by Karl
(Becker) • • • . Karl told me that he went on
with my idea, informed everybody, tried to
inform me and was unable to do so. I shouldn't
have been that hard to find • . • • He said he
went ahead with a date on the letter and there
is not a date on the letter. All in all, the
way the meeting got set up is very questionable. S
19

Second, Lemmer was instructed to go to the meeting
by his control, Special Agent Richard J. O'Connell,
who
made it known to me prior to my leaving . • •
that the Jacksonville office, Jacksonville,
Florida, office of the FBI, had requested my
presence in Gainesville and I was told that
it would be up to them to finance my trip
down there -- that if and when it came time
to move, I was to contact John Maher and pick
up money for that trip down there • • • • They
gave me $210 to make the round trip from New
York to Gainesville and back to New York. 6
Squad 19
It looks as though members of the government were
the actual conspirators and that they were attempting to set VVAW up as a scapegoat for their actions.
A September, 1971, statement by Louis Tackwood, a
former Los Angeles Police Department agent provocateur, suggests a disturbing basis for this contention. Tackwood, in a press conference, described a
plot involving a special group, Squad 19, which was
created by the Criminal Conspiracy Section of the
Los Angeles Police Department and the FBI.
This plan entailed planting a number of agent
provocateurs both inside and outside the Convention. Agents were to infiltrate the groups
planning demonstrations against the war and
poverty. At the time of the demonstrations,
the agents were to provoke street battles with
police surrounding the convention hall. Meanwhile, agents inside the convention hall were
to plant explosives timed to blow up coincidental with riots in the streets. The purpose
was to kill a number of delegates. The result
would be to create a nationwide hysteria that
would then provide President Nixon with the
popular support necessary to declare a state
of national emergency. Orders for Squad 19
came directly from the California State Department of Justice, and State Attorney General
Evelle Younger. Richard Nixon would then arrest all militants and left-wing revolutionaries and cancel the 1972 elections. He could
invoke special emergency powers leading to the
detention of political activists. 7
Agent Provocateurs Active in VVAW Planning
for the Convention Demonstrations
William Lemmer

Tackwood's charges are too serious to be accepted
without an examination of available facts. First,
he claimed that "agent provocateurs • • • were to
infiltrate the groups planning demonstrations." VVAW,
which was planning demonstrations, was infiltrated
and at least one of the infiltrators was a provocateur: Lemmer, the "star" witness in the Gainesville
8 trial. While he was stationed at Fort Benning,
Georgia, he encouraged others to telephone bomb
threats and tried to get them to blow up a water
tower. After he got out of the Army, in July, 1971,
he moved to Fayetteville, Arkansas, where he instructed a high school student in the manufacture of a
fire bomb and then accompanied the boy to the site
of the attempted fire bombing. Lemmer described the
incident to the three of us in Fayetteville.
He asked me if ether would be a better fuel
than gasoline and I told him, by all means,
ether would definitely be better than gasoline. The night that he got busted (arrested)

20

we went over to his house, picked up the
material, and I went out to watch. 8
Lemmer also talked a Fayetteville veteran into sending a bomb threat. And in another incident, he
helped talk demonstrators at an Air Force base in
Oklahoma into going on the base despite police and
military orders not to do so. In the last three instances people, other than Lemmer, served time.
Lemmer also tried to project a violent image of
VVAW, contradictory to the organization's history
of only staging peaceful protests. During a local
Arkansas march, Lemmer insisted, in vain, that the
VVAW members be armed and defy police orders. In
May of 1972, he stepped up his campaign. At a demonstration in Washington Lemmer tried to get fireworks and explosives to set off in trashcans, which
would sound like gun fire, in order to divert police
attention away from the main body of demonstrators
and on to VVAW. Again he was unsuccessful. About
a week later, on a trip to Florida, while easily
identifiable as a VVAW member since he was wearing
military fatigues and a VVAW button, he talked loudly in public places about bombing and killing.
Pablo Fernandez

Another agent provocateur, Pablo M. Fernandez,
while not actually infiltrating VVAW, did befriend
Camil and other Florida veterans. As an FBI and
Miami Police Department informer, Fernandez tried
to sell weapons, from guns to hand grenades and
mines, to Camil and Foss. Major Adam Klimkowski,
Commander of the Miami Police Department's Special
Investigations Section, stated:
We were hoping for the overt act necessary
to produce a charge of conspiracy . . • • We
did not want Camil to actually acquire weapons, ••• we wanted to find out what was
in the back of his mind. 9
Government witnesses have consistently contended
that Camil and Foss asked for weapons, while the
two defendants have insisted they were offered them.
Klimkowski's statement, while ambiguous, tends to
support Camil and Foss. Whatever the truth may be,
one fact is irrefutable: no member of VVAW followed
up and bought any of the weapons.
Fernandez was part of a group of agitators paid
to go to J. Edgar Hoover's funeral, May 5, 1972, to
harrass demonstrators. The group included Watergate
burglars Bernard L.' Barker, Frank Fiorini (alias
Frank A. Sturgis), Virgilio R. Gonzales, and perhaps Eugenio Rolando Martinez, under the name of
Rolando Martinez. One of the Fielding burglars,
Felipe de Diego, was also in the party as were
Reinaldo Pico, Angel Ferrer, and Humberto Lopez.
In a "Miami Herald" article, Fernandez is quoted
as saying:
I kicked a hippie. . • . I knew someone big
was protecting us because the Capitol police
did not try to arrest me. lO
Fernandez went into more detail when he discussed
this, and other activities, with another Miamian,
Angelica Rohan. She appears to be nearly the only
informant involved in convention intelligence who
was sincerely working for peaceful demonstrations,
"so the name of the Cubans would be clean and everything would be good for the Cubans."ll On May 23,
1973, Rohan gave sworn testimony to U. S. District
Judge W. O. Merhtens in which she read and interpreted her notes of what Fernandez had told her. Many

COMPUTERS and PEOPLE for December. 1974

to,

t

/t<.,

-,!J

\1

~

of the points she mentioned are supported by other
reports of the incident.
I am going to quote whatever Pablo (Fernandez)
told me, which I took down as he was giving it
to me. I read it back to him, and when something was not clear I went back and redid it
Briefed by Mr. Bernard Barker and Mr. Martinez
at the hotel before the 2-hour break upon arrival in Washington. When we had to go to the
funeral, the instructions were that one of the
group that spoke English had to insult Mr. Daniel Ellsberg or Doctor Daniel Ellsberg. One
group would destroy Ellsberg's loud speakers
and all his equipment • • • • They were given
pictures of Mr. Ellsberg and he told them to
aim at him • • • • (Sturgis)* started insulting
Ellsberg, then Pablo, then Barker. Pico threw
a punch at a hippie and that is when everything
started. Rolando Martinez and Virgilio Gonzales had whoever appeared to be Ellsberg's
security man, held him while Pablo punched
him. (Sturgis) and Ferrer were taken by the
police, the Riot Control, to a car and then
released. Capitol police were five feet away
and were like protecting the Cubans, you know,
like "Well done," by a sergeant of the police
at the Capitol told Pablo after punching Ellsberg's security man. The police protected
Pablo and he left the site. 12

;-

Vincent J. Hannard of Miramar, a private investigator • • • said he was offered work in
"intelligence and instigation" during the conventions at Miami Beach.
Hannard claimed he received separate calls
from Sturgis, and maybe Barker, and two others
and they asked him to help disrupt activities
of the Vietnam Veterans Against the War -- an
organization thoroughly infiltrated by police
and federal informers before and during the
conventions.
According to Hannard, each call came from a
different person, and each caller tried to
persuade him that it was his patriotic duty
to help undermine the VVAW.
Hannard said he was sure it was Sturgis, because he has known him for more than 13 years
and recognized his voice.
Hannard said another caller identified himself
as Barker. However, Hannard said he never has
met Barker and could not be certain who actually called him. . • •
Hannard said he told an FBI agent, Jack Ackerly, about the calls shortly after he received
them. Ackerly said he knows Hannard, but refused to talk about conversations he may have
had with him.

Sometime after that trip, Eugenio Martinez tried
to enlist Fernandez's services to create trouble at
the Democratic convention.

According to Hannard, none of the four callers
told him what would be expected of him if he
agreed to do the proposed undercover work.
But he said each mentioned the VVAW and described the task as covert intelligence and
instigation.

Watergate burglar Eugenio R. Martinez offered
(Fernandez) $700 a week to infiltrate protest
groups at last summer's Democratic convention
and embarrass George McGovern "for the Republican Party."

"It was clear from what they said that I was
supposed to incite trouble or riots from the
anti-war groups," he said. "I was told it
would be activity pertaining to the convention
and an opportunity to travel.

Pablo Manuel Fernandez, 28, a burly, heavy
equipment parts clerk who left Cuba as a teenager, said he was told by Martinez: "You get
10 people and get inside McGovern headquarters
in the hotel." ••

"And there would be great rewards when the
President was re-elected."

Barker paid all the expenses and gave $100 in cash
to each participant, according to Rohan's statement.

I

i'
'It"

Fernandez said Martinez came to him with the
long-range offer in which he was told he could
make $700 a week from last June (1972) until
"after the President took office early this
year", presumably meaning the inauguration of
Nixon's second term. 13
According to Rohan, at least two other Cubans were
to head other teams, which sound very similar to the
fireteams the Gainesville 8 were accused of forming.

Hannard said he was offered $1,000 a week for
that work but that in the fourth call the offer was raised to $1,500. 14
John Kifner, for "The New York Times," filled in
some details in Hannard's story.
In a long deposition taken by the Broward
County State's Attorney's Office, a man with
Cuban and Central Intelligence Agency ties,
Vincent J. Hannard said that he had been offered $1,500 a week in a telephone call from
a man calling himself "Eduardo" -- (E. Howard)
Hunt's code name -- to infiltrate the VVAWand
cause trouble.

Others Asked to Infiltrate VVAW
Vincent Hannard

Frank Sturgis approached another Floridian with a
similar offer. Vincent J. Hannard gave sworn testimony in private and then spoke to reporters.
'* Rohan used Fiorini, but I have substituted Sturgis
since this is the name by which most people know
him.

COMPUTERS and PEOPLE for December, 1974

"Basically we had to expose the V.V.A.W. being pink and Communist and all this stuff,"
he said, adding that he was wanted "because
of my reputation as an instigator rather than
an investigator."
He said that he had refused because the amount
of money being offered made the job seem too
dangerous. Mr. Hannard has worked as an Informer for the C.I.A., the F.B.I. and local
police forces .15

21

Alfred Baldwin and John Eck

Alfred C. Baldwin, 3rd, the ex-FBI agent who monitored the illegally placed telephone taps at the
Democratic National Headquarters, was also asked to
infiltrate VVAW. A Miami gun dealer, John Eck, admitted that he too had been contacted but would not
say by whom other than by someone named in connection with the Watergate case.
Government Support of Plans to Kill
Convention Delegates

Returning to Tackwood's statement, to examine
another of his contentions, he said that "the purpose" of the riots and explosions "was to kill a
number of delegates." Fernandez claimed to be able
to get the weapons necessary to produce the explosions. Lemmer proposed a variation. In January or
February, 1972 -- just four or five months after
Tackwood's press conference and six months before
the first national political convention -- Lemmer
suggested to several VVAW members that they should
break down automatic weapons, strap them to their
bodies under their clothes, smuggle them into the
convention hall, and "rip people off" -- in other
words, kill them. Just as no one bought weapons
from Fernandez, no one accepted Lemmer's suggestion.
Lemmer, like Fernandez, confided in a woman, Barbara Stocking. On May 25 and 26, during a drive to
Florida, he told Stocking of plans that she found
so disturbing she filed an affidavit, in which she
said Lemmer
said that I should not go to the Miami conventions because, he said, all of the VVAW
leaders were going to be picked up and taken
out of circulation, and he and some other
people were going to shoot leaders of the New
Left, and start a riot, and there would be a
lot of fighting and shooting, and everyone
would be arrested. He also spoke of shooting
the "Trots" (Trotskyites) and Progressive
Labor movement people and pretending that
VVAW had done it, and this would discredit
the VVAW and split the peace movement. He
said he had a source of unlimited funds to
carry this out. 16
Stocking's statement that Lemmer told her "there
would be a lot of fighting and shooting and everyone
would be arrested," supports Tackwood's contention
that "the result would be to create a nationwide
hysteria that would then provide President Nixon
with the popular support necessary to ••• invoke
special emergency powers leading to the detention
of political activists."
Proposed Mass Kidnappings of Movement Activists
FBI Participation

There is a good bit of evidence that preparations
were being made for the "detention of political activists." When describing his activities with the
FBI, Lemmer told us a little about a plan the FBI
had to round up movement leaders.
LE~mIER:
I was told to prepare a Ii st of movement people around me, around Fayetteville, a
list of movement people who I could count on
should I have to go underground. The fact
that they said, "I have to go underground"
told me something, more than in the back of
my mind.

22

Q:

The resident agent here requested it?

A: Right. Well, I guess you could say requested. I was told to prepare a list. The
list of people was made up. I have discussed
with him, not the list specifically, but the
possibilities of certain developments in Miami
and across the country making it necessary for
a round-up, similar to the ones we saw of the
Japanese-Americans in World War II. He has
confirmed that possibility openly at one of
our meetings, in fact, the last of our meetings.

Q:

Did he give you any sort of a ••• probability reading on it?
A: An extremely good possibility, to the
point that we discussed alternate identification for myself so that I would have the ability to move about the country, have freedom of
movement, during any type of round-up, any
type of situation during which the movement
would have to go clearly underground. 17
There was, indeed, a list of local movement people
in the files of the Fayetteville, Arkansas, FBI office.
White House and CRP Participation

Both John W. Dean, 3rd, and Jeb Stuart Magruder,
in their testimony to the Ervin Committee, stated
that mass kidnappings of radicals had at least been
considered by them and John Mitchell as a part of
the so called Liddy plan, devised by G. Gordon Liddy.
MAGRUDER: There were projects relating to
the abduction of individuals, particularly
members of radical groups that we were concerned about on the convention at San Diego.*
Mr. Liddy had a plan where the leaders would
be abducted and detained in a place like Mexico and that they would then be returned to
this country at the end of the convention. 18
DEAN: Plans called for mugging squads, kidnapping teams, prostitutes to compromise the
opposition, and electronic surveillance. He
(Liddy) explained that the mugging squad could,
for example, rough up demonstrators that were
causing problems. The kidnapping teams could
remove demonstration leaders and take them
below the Mexican border and thereby diminish
the ability of the demonstrators to cause
trouble at the San Diego convention. 19
Lemmer told us that the detained activists would be
held in the old concentration camps, where the Japanese-Americans were held, which he claimed were
being renovated, but he told Stocking that the radicals would be taken to Mexico City.
Both Magruder and Dean referred to the kidnapping
and mugging teams only in reference to the first of
Liddy's proposals, which was rejected, leaving the
implication that they were among the more "bizarre"
elements that had to be removed before the plan
could be approved, as it was on March 30, 1972. But
Magruder, in his book "An American Life: One Man's
Road to Watergate", mentions that he told his wife
in the spring of 1972 that the government might have
to round up radicals and take them to Mexico, adding
that they might not come back. Since the first two
*At the time that the Liddy plan was under consideration, the Republican Convention was still scheduled
to be held in San Diego.
COMPUTERS and PEOPLE for December. 1974

..

versions of Liddy's plan were considered on January
27 and February 4, which are unquestionably in the
winter, Magruder's statement suggests that the idea
of the kidnappings was still under consideration, at
least, when the plan was finally approved in late
March.
;,

Putting a few events into chronological order
shows that such bizarre acts as kidnapping and mugging at government direction may not have been among
those aspects of the Liddy plan that were removed.
The plan was approved on March 30, 1972. Fernandez
admitted to being part of a mugging team (although
without using those exact words) at Hoover's funeral
on May 5. Lemmer's descriptions, in late May and
early June, of a kidnapping plot is almost an exact
duplicate of the one described by both Dean and Magruder a year later.
Detention of VVAW Members

Mass kidnappings did not occur, probably because
the June 17 discovery of the Watergate break-ins
forced a change in plans. More than twenty VVAW
members were detained, however, during the Democratic National Convention. In a coordinated two-day
sweep, covering at least five states, FBI agents
issued subpoenas to approximately twenty-three VVAW
members ordering them to appear before a federal
grand jury in Tallahassee the morning of July 10,
the day the Democratic Convention opened. Never before had so many people been subpoenaed by a federal
grand jury to appear on a single day. This raised
at least three questions. The first involved the
possibility that the government was deliberately
denying these people's rights to present their case
to political delegates by detaining them. The second, the probability that the government used the
grand jury to further embarrass the Democratic Party
by calling an unusual evening session from which an
indictment was issued against some of the veterans
about two hours after the Democrats approved a resolution in support of the subpoenaed VVAW people.

J-

But the third question raises the most disturbing
suspicions. Was the government hoping to turn those
VVAW demonstrators who were in Miami Beach into an
unruly mob? These members were furious about the
subpoenas. The government may well have assumed that
the veterans were without leaders, since most of the
men responsible for VVAW's demonstrations were being
held in Tallahassee. Angry leaderless groups of
people can be roused to violence and several agitators were found in their midst. At least one,
after being evicted from the campsite by veterans
because he was causing trouble, is reported to have
returned with the police and identified himself as
an undercover agent. The veterans, however, did
manage to maintain discipline, directing their anger into explanations of the situation to the delegates.
Riots as Excuse to Cancel 1972 Elections

Finally, Tackwood stated that "a nationwide hysteria ••• would then provide President Nixon with
the popular support necessary to declare a state of
national emergency • • . and cancel the 1972 electi ons. " There is evidence that members of the government had given serious consideration to such a
cance lla ti on.
In the spring of 1970, William Howard, a Washington, D.C. reporter for the conservative
Newhouse chain, published a story about a
"contingency plan to cancel the 1972 elections," which he claimed he learned about

COMPUTERS and PEOPLE for December. 1974

from the wife of a Rand Corporation executive.
There was a virtual news blackout on the subj ect.
According to Howard, the President (Nixon) had
ordered the Rand Corporation think tank in
Santa Monica, California, to do a "feasibili ty
study" of the cancellati on possibi li ty in 1972,
because of Nixon's concern about possible "disruption by the left."
The "Los Angeles Free Press" picked up the
story and was told privately by persons at Rand
that it "had for once done a good and right
thing in publishing the story."20
This study may have been ordered originally as a
precaution against pOlitically oriented violence,
which did seem to be escalating in 1969 and 1970.
This would be a perfectly valid reason for doing
such a study. But it assumes sinister implications
when seen from the perspective of 1972. By this
time, incidences of violence from the left had dwindled drastically, as had talk of it within movement
groups. But while interest in violence had been
languishing, provocateurs had been proliferating.
Aside from those known to be involed with VVAW,
there was Robert Hardy, without whose help, and
the money he received from the FBI, the Camden 28
would not have destroyed draft files. There is
good reason to believe that some of the Weathermen
might not have done so much damage if FBI provocateur Larry Grantwohl had not been so insistent.
These are just two of many such cases. It is reasonable to assume, therefore, that members of the
Nixon administration, and others working in concert
with them, were hoping for the disturbances that
would justify the invocation of martial law and the
cancellation of the elections as a means to circumvent the balancing controls contained in the constitution. This would give them an indefinite tenure in a position of power beyond reach of either
Congress or the courts. Thus, the existence of such
a study in a climate so infected with provocateurs
indicates that members of the government were attempting to ensure that the havoc they needed would
occur.
Conclusion

Watergate South appears to go far beyond what
has thus far been revealed in Watergates East and
West, into a scheme to subvert the United States'
constitutional system of government. The evidence,
while not being conclusive, is consistent. It indicates' that a plan may have been implemented in
which provocateurs would instigate riots at one or
both 1972 political conventions. Leaders of the
movement would be arrested and taken from the country. This would be done either before the conventions to prevent them from controlling their people,
so that the provocateurs could be more effective, or
in response to the instigated rioting, thus provoking still more violent reactions from those remaining. The American people, terrified by such disturbances, would then be amenable to the imposition
of martial law, and perhaps even the cancellation
of the elections. This is a disturbing hypothesis,
but events do tend to support it. Far more intensive investigations must be conducted either to
prove or to disprove this theory. The implications
of Watergate South are too serious to remain an obscure question of which only a few people are aware.
(more)

23

Biographical Information

Jack ACKERLY - Florida FBI agent to whom Vincent Hannard allegedly reported the offer from Frank Sturgis to infiltrate VVAW
Gerald ALCH - Attorney for James McCord during his
trial for the Watergate break-in
Alfred C. BALDWIN, 3rd - Former FBI agent who monitored taps on telephones at the DNC, asked to infiltrate VVAW
Bernard L. BARKER - Convicted member of the "plumbers"
unit who directed Cuban agitators at J. Edgar
Hoover's funeral
Karl BECKER - Charles Henry Becker, 3rd, FBI informer from New Orleans who testified against the
Gainesvi lle 8
Scott CAMIL - A Gainesville 8 defendant and formerly
Florida regional coordinator for VVAW
Charles W. COLSON - Former special counsel to then
President Richard Nixon, pleaded guilty to obstructing justice
Harrison CRENSHAW - Dade County (Florida) Public
Safety Department officer who infiltrated VVAW,
now deceased
John W. DEAN, 3rd - Former counsel to then President
Richard Nixon, pleaded guilty to conspiracy to
obstruct justice
Felipe de DIEGO - Cuban exile and member of the
"plumbers" unit who has admitted breaking into
Dr. Lewis Fielding's office
Donald C. DONNER - The VVAW member from Fayetteville,
Arkansas, who conducted the June, 1972, interview
with William Lemmer
John ECK - Miami gun dealer asked to infiltrate VVAW
"EDUARDO" - See E. Howard Hunt, Jr.
Daniel J. ELLSBERG - Former Rand Corporation employee who turned over the Pentagon Papers to "The
New York Times"
Pablo M. FERNANDEZ - Cuban exile, FBI and police informer in Miami, and paid agitator at J. Edgar
Hoover's funeral
Angel FERRER - Cuban exile and paid agitator at J.
Edgar Hoover's funeral
Lewis FIELDING - Daniel Ellsberg's psychiatrist
whose office was broken into by members of the
"plumbers" unit
Frank FIORINI - A soldier of fortune, convicted member of the "plumbers" unit, better known as Frank
Sturgis
Alton C. FOSS - A Gainesville 8 defendant and formerly Dade County coordinator for VVAW
Virgilio R. GONZALEZ - Cuban exile and convicted
member of the "plumbers" unit
Larry GRANTWOHL - An FBI informer and provocateur,
in late 1969 and early 1970, who trained and encouraged Weathermen in Ohio
Vincent J. HANNARD - Private investigator from Miramar, Florida, who was active in Cuba when Castro
took over, asked to infiltrate VVAW
Robert HARDY - An FBI informant whose admissions in
court led to the dismissal of the Camden 28 charges on grounds of entrapment
J. Edgar HOOVER - Former FBI Director who died May
2, 1972
William HOWARD - The reporter who broke the story
of the Rand Corporation study on the cancellation of the 1972 elections
E. Howard HUNT, Jr. - Former CIA agent, White House
consultant, and convicted of conspiracy, bribery,
and wiretapping, known to Cuban exiles as Eduardo
John Kifner - Reporter for "The New York Times" who
covered the Gainesville 8 case
Major Adam KLIMKOWSKI - Commander of the Special Investigations Section of the Miami Police Department
William W. LEMMER - Former FBI informer from Arkansas and principal witness against the Gainesville
8
24

G. Gordon LIDDY - Former White House aide, counsel
to CRP, convicted of bribery and wiretapping
Humberto LOPEZ - Cuban exile and paid agitator at
J. Edgar Hoover's funeral
Jeb Stuart MAGRUDER - Former White House aide, chiefof-staff for CRP, pleaded guilty to conspiring to
obstruct justice
John F. MAHER - FBI agent working out of the New
York City office
Eugenio R. MARTINEZ - Cuban exile and convicted member of the "plumbers" unit
Rolando MARTINEZ - Paid agitator at J. Edgar Hoover's
funeral who may be convicted "plumber" Eugenio R.
Martinez
James W. McCORD, Jr. - Former CIA agent, security
coordinator for CRP, and convicted of burglary
and wiretapping
George McGOVERN - The 1972 Democratic presidential
candidate
Stephen McNELLIS - Minnesota coordinator of the
Vietnam Veterans for a Just Peace
W. O. WEHRTENS - U.S. District Judge in Miami
John N. MITCHELL - Former U.S. Attorney General,
director of CRP, and under indictment for conspiracy, obstruction of justice, and perjury
Richard M. NIXON - Former President of the United
States, unindicted co-conspirator for obstruction
of justice, since pardoned
Richard J. O'CONNELL - FBI agent and William Lemmer's
resident control in Fayetteville, Arkansas
Reinaldo PICO - Cuban exile and paid agitator at
J. Edgar Hoover's funeral
Emerson L. POE - FBI informer from Florida who testified against the Gainesville 8
Angelica ROHAN - Cuban exile and police informant
in 1972 to whom Pablo Fernandez confided
Gerald RUDOFF - Dade County (Florida) Public Safety
Department officer who infiltrated VVAW
Barbara STOCKING - Former Teaching Fellow in Philosophy at Boston University to whom William Lemmer
confided
Frank A. STURGIS - See Frank Fiorini
Louis TACKWOOD - Los Angeles agent provocateur for
ten years who broke his cover and talked in 1971
Evelle YOUNGER - California State Attorney General
allegedly directing Squad 19
Bibliography

1. James W. McCord, Jr., May 18 and 22, 1973, Hearings before the Select Committee on Presidential
Campaign Activities of the United States Senate,
Phase I: Watergate Investigation, Book 1, pp.
180 and 200
2. Gerald Alch, as quoted by Walter Rugaber, "The
New York Times," January 17, 1973
3. John Kifner, "The New York Times," August 9, 1973
4. Rob Elder, "Miami Herald," June 13, 1973
5. Unpublished commentary by Donald C. Donner on the
June, 1972, interview of WHliam Lemmer
6. Transcript of unpublished interview with William
Lemmer conducted June 3 and 4, 1972
7. Richard E. Sprague, "The June 1972 Raid on Democratic Party Headquarters (The Watergate Incident)
-- Part 2, "Computers and Automation," October,
1972, pp. 24-25
8. Interview with William Lemmer
9. Rob Elder, "Miami Herald," May 26, 1973
10. Rob Elder, "Miami Herald," May 23, 1973
11. Unpublished statement given by Angelica Rohan
to U.S. District Judge W.O. Mehrtens on May 23,
1973
12. Statement of Angelica Rohan
13. Rob Elder, "Miami Herald," May 23, 1973
14. Dennis Holder, "Miami Herald," June 8, 1973
15. John Kifner, "The New York Times:' August 8, 1973
16. Unpublished affidavit submitted by Barbara Stocking on July 9, 1972
COMPUTERS and PEOPLE for December. 1974

17. Interview of William Lemmer
10. Jeb Stuart Magruder, June 14, 1973, Hearings before the Select Committee, Phase I, Book 2, pp.
707-788
19. John W. Dean, 3rd, June 25, 1973, Hearings before the Select Committee, Phase I, Book 3, p. 929
20. Citizens Research and Investigation Committee
and Loui s E. Tackwood, "The Glass House Tapes,"
Avon, New York, 1973, p. 171
0
Imberman - Continued from page 14

of course -- and was responsible for the union activity.
The consultant recommended a system of baffles
~e installed to cut the noise in the department, ahd
In the nearby area. In addition, he suggested pipedin music which (by contrast) seemed to diminish the
racket. Having music in the plant was so novel that
it went far to eliminate the basic complaint. In addition, improvements were made in the physical working condi tions that had been mentioned by many employees. The company won the second election 2-to-l.
Most often, our research indicates, worker dissatisfaction does not seek outlet along union lines.
Such dissatisfaction is simply channelled in that
direction by organizers who know how to take advantage of discontent.
Recognize Discontent

It is therefore vital for management to discover
what is breeding worker discontent. Some trivial
things such as inadequate lighting, poor circulation of heat in a department, wet or dirty floors,
leaky restrooms, or begrimed windows may be the
cause and very often is the cause -- if employers
had a good upward communications system to bring
those matters to the surface quickly. A more important matter such as heavy-handed foremen may
cause worker revolt despite the fact that they have
borne that burden for years. This latter is common
but most executives never recognize it. Or finally:
the demand for cost-of-living increases -- far exceeding guidelines -- crops up, with employees ignorant of what such cost increases might do to the
company's competitive position AND EMPLOYEE JOBS.
e

Understanding Employees

It takes a great deal of time, effort and skill
to listen to employees and to understand them. This
important chore is part of sophisticated foremen
training, and is not too common. In this connection, I have been through 288 NLRB elections winning 9~.4 ~er cent just by inaugurating a tw~-way
commUnICatIons system and foremen training. Most
of the losses were the result of being called in
when the fire was already up to the attic. Given
time, techniques employed by such experts can be
learned by company personnel.
Employee Goodwill

Such techniques work splendidly, not to undermine union sentiment particularly, but more importantly to win employee goodwill for management -even where unions exist. Then production and sales
may go on uninterruptedly, enabling both management
and labor to earn larger returns.
For management and labor each to earn its fair
share, it becomes important to listen with a trained
"third ear" and to train supervisors and top management how to do so -- if the number of NLRB elections
in this industry is to be reduced and not extended. 0

COMPUTERS and PEOPLE for December, 1974

Antley - Continued from page 17

We can predict the need for physicians who can dithe advancing technology of medicine, and phySICIans who can interpret the knowledge made possible
through technology to the patients. But because of
~he.rapid chan~es in medicine which are occurring,
It IS not possIble to foresee all of the specific
a7e~s that w~ll demand new skills.
A formal recognItIon of thIS state of rapid change should be acknowledged, however. It should be taken into consideration in a reorganization of medical education,
so that new physicians will be educated with the
skill to recognize and adapt to new situations.
r~c~

The Super-Technologist

Indeed, perhaps the greatest significance to be
gained from predicting the role of the physician in
the near future is in the adaptation of medical education today. Obviously two different areas need
to receive serious consideration in an evolving curriculum. The first would be concerned with training
the super-technologist. The emphasis on this training should be towards proficiency in theoretical
mathematics, statistics, physics, computers and
electronics. However, the fact that it may be necessary for a man to retrain himself several times
in his career should be stressed, and adaptive skills
for this should be developed. This is not a simple
task. Its requirements infer that the trainee needs
to have the most current technical information either
~ithout having his identity strongly associated with
Its content or that he have the capacity to take a
new identity with each retraining.
The Really Effective Counselor

A second area of emphasis in medical education
should be on helping the physician to become an effective counselor. There are several approaches to
this problem. Educational programs for clinical
psychologists and psychiatrists have already developed methods of training aspirants in communicative
and facilitory skills. These techniques are available to the aspiring physician-counselor and should
be uti Ii zed.
Techniques, however. are not in themselves solutions to educating counselors. The ability to empathize with patients, to accept each one as an individual. and to respect his value system and lifestyle is not ~cquired through skill courses. It may
be developed In part through the study of sociology
and anthropology, but philosophical knowledge does
not equal compassion and sensitivity. To develop
these paramount qualities of a counselor some work
in personal growth, either in group or i~dividual
therapy is probably required. Group work described
by Cadden et a1 7 and Kubler-Ross8 with severely ill
pati~n~s.suggests effective methods for developing
sensItIVIty.
Thus. technology continues to shape the direction
of medical practice through its increasing incorporation into diagnosis and treatment. The development
of new skills by physicians in response to technical
adv~nce~ent w~ 11 be necessary; while appropriate educatIon In medIcal school should facilitate this adaptive development.
References

1. Postman N•• Weingartner C.: Teaching as a subversive activity. Dell Publishing Co., Inc., 1969
(please turn to page 34)

25

The Assassination of the Reverend Martin Luther King, Jr.,
and Possible Links With the Kennedy Murders
- Part 11 (Conclusion)
Wayne Chastain, Jr.
810 Washington Ave., Apt. 408
Memphis, Tenn. 38105

Was the murder of the Reverend Martin Luther King, Jr.,
the result of a conspiracy? Previous installments of this
series described the "eggs and sausage" man, later given the
code name of Jack Armstrong, who appeared on the scene
the day of the murder. Also appearing on the scene were
Tony'Benavides and J. Christ Bonnevecche who claimed to
have information and understanding of Dr. King's and
John F. Kennedy's assassinations. Are these two men to
be believed? Are they one and the same person - possibly
aliases for Jack Armstrong?
Is there a relationship between these assassinations? a conspiracy at work by an organization or several individuals? or
are these murders more simply vendettas? Mr. Chastain continues to seek the answer to these questions and to the murders of Dr. King and the Kennedys.

The metamorphosis of memory evolved along a tortuous route, climaxed with the transformation of a
drunken derelict into a reliable witness, and the
degredation of a reliable witness -- Mrs. Walden -into a supposed psychotic. Could the discrediting of
Mrs. Walden have been the result of her earlier statement that she had heard the shot fired from outside
the rooming house -- a statement that confirms Jones'
contention that he saw the man outside the rooming
house and in the bushes -- and that the man she saw
coming out of the bedroom was neither Ray nor the man
described by Mrs. Brewer as John Willard?
Stephens' belated recall came after a drinking
session with a British newspaper man. Ray had just
been apprehended in London. The British newspaper
man gratuitously provided Stephens with a fifth of
whisky and at least $30 in cash.

Charlie Q. Stephens

Neither Atty. Gen. Phil Canale nor his team of
prosecutors ever summoned Jones or myself to testify.
No doubt, Jones' credibility would have been attacked
by prosecutors if the defense had attempted to put
Jones on the stand. Jones has a criminal record
because of felony convictions for theft by check.
On the other hand, Canale and his prosecutors
had no qualms about constructing their entire case on
the testimony of Charlie Q. Stephens, a man with 155
arrests on his record, including an assault to murder with firearms.
Why would Stephens be deemed by the prosecution
as a more reliable witness than Jones, despite 154
more arrests than Jones?
Jones is black and Stephens is white.
As stated in Part 9, Stevens said he saw the
man who ran out of the bathroom and that he was "nigger". Stephens made this statement to this reporter,
both on the night of the slaying and the next day.
On the night of the slaying, Mrs. Brewer and Mrs.
Walden, who were both sober, told me to ignore Stephens because he was "falling down drunk" at the time
of King's slaying. A third witness, Charles McGraw,
the cab driver, would later inform me also that Stephens was intoxicated at the time.
Police and FBI agents ignored Stephens' statements for several weeks after King's death. Then,
Stephens changed his story and his credibility is
seemingly enhanced. Stephens came forth and said he
saw a white man come out of the bathroom and that Ray
was the man.
26

Wayne Chastain of Memphis, Tenn., is a veteran
newspaper reporter and Southern j ournali st wi th
experience on several metropoli tan dailies in
Texas, including EI Paso, Houston, Dallas and San
Antonio, as well as on the St. Louis Globe-Democrat and a Memphis daily. He had traveled with
Dr. King's entourage on and off for two years
prior to the assassination. He had spent the last
two days of King's life covering hi s speeches in
Memphi s pri or to the shooting. He was on the murder scene wi thin 10 minutes after Dr. King was
shot. He interviewed eyewitnesses for one of the
fi rst comprehensive news accounts to the nati on of
Dr. King's death. A native Texan and a graduate
of the Uni versi ty of Texas wi th a bachelor's degree in hi story and poli tical science. Mr. Chastain also spent several months in early 1964 investigating and researching the assassination of
President Kennedy, Jack Ruby's link with Lee Harvey Oswald and a group of pro-Cuban arms runners,
and other activities related to Kennedy's death.
Months before The Warren Commission's report,
which was published in the fall of 1964, Mr. Chastain -- after exhaustive interviews with hundreds
of witnesses -- had reached the conclusion that
President Kennedy's death was the result of a
plot involving paramilitary professionals financed
by a group of weal thy, right-wing Texans wi th
strong connections wi th former high officials with
the Central Intelligence Agency as well as lower
echelon CIA personnel still assigned to the bureau. The present installment is an excerpt from
a forthcoming book enti tIed: Who Really Ki lIed
Dr. King -- And the Kennedys? A Disturbing View
of Political Assassinations In America.

COMPUTERS and PEOPLE for December, 1974

The next day, under the newspaperman's byline,
Stephens is quoted as saying he recognized Ray from
newspaper photographs as the man whom he had seen
running out of the bathroom.

den after the State Department said Stephens' statement identifying Ray as the man Stephens saw come out
of the bathroom was introduced into evidence during
the extradition hearing in London.

FBI and Police Disbelieve Stephens

Later, I learned she had been committed to the
West Tennessee Psychiatric Hospital in Bolivar, about
60 miles from Memphis, on the same day that the FBI
finally got custody of Stephens as a material witness.

FBI and Memphis police assiduously avoided Stephens -- especially after his previous drunken asserti ons that it was a "nigger" -- as early as the
morning after the slaying, after Mrs. Brewer and
Mrs. Walden had described his condition of the night
before to them.
Suddenly, Stephens' recuperative recall powers
re-awakened the interest of the FBI.
Inspector N. E. Zachary, although a fervent
believer in the lone assassin theory, never did
attach any credence to Stephens' statements -- even
after the elaborate rehabilitation of Stephens by the
FBI.
Zachary accounts for the transformation of Stephens into a credible witness as a "bureacratic blunder."
An FBI agent in Washington, D.C., happened to read
the story by the British newspaper writer quoting Stephens. There was nothing in the investigative reports
coming to Washington about a witness named Stephens.
(He was deemed so lacking in credibility that the
field agents did not even mention him in their
reports.)
So, the Washington agent clipped the British
article and sent an immediate bulletin to the ~lemphis
office of the FBI to pick up Stephens.
The FBI notified the police dispatcher to have
Stephens picked up. Stephens was a well-known police
character, and his early morning hang-outs were well
known to the police dispatcher, who immediately
sent a patrol car to a downtown park to have Stephens picked up. After Stephens was picked up, the
patroman called the dispatcher back and asked where
to take him. The dispatcher, knowing Zachary as the
inspector in charge of the Memphis police department
investigation of the King slaying, told the patrolman
to take Stephens to Zachary's office, temporarily
forgetting that the request came from the FBI.

...,

The patrolman delivered Stephens to Zachary's
office. Zachary was on the phone, so the patrolman
left Stephens with another officer outside Zachary's
office. When Zachary's call was finished, the officer outside said Stephens was there.
Zachary, familiar with the statements by Mrs.
Brewer, Mrs. Walden, and others in the rooming house,
said: "What do I want with him .•. let him go."
Later in the day when the FBI called again and
asked if Stephens had been picked up, the search for
Stephens was launched again and he was located.
"lie was strictly an FBI witness ••• not ours,"
Zachary later said.
Iluring the extradition hearings, FBI agents took
Stephens into protective custody, kept him in posh
motels, and provided him with money and liquor -- and
away from the press.
Mrs. Walden Disappears

Meanwhile, Mrs. Walden mysteriously disappeared.
Tlli s reporter spent three days looking for Mrs. WalCOMPUTERS and PEOPLE for December, 1974

The procedures used to commit Mrs. Walden were
not only unorthodox, but illegal, as a subsequent
hearing three years later confirmed. Staff physicians
at the institution said Mrs. Walden should never have
been committed, but with her common-law husband in
protective custody by the FBI, there were no family
members that could obtain her release or protest the
commi ttment.
In January 1969, a month before the trial of James
Earl Ray, a staff psychiatrist at the hospital recommended Mrs. Walden be immediately discharged and
noted in his record that her committment had violated
the procedures set forth in the Tennessee mental
health committment statute -- a modern law based on
model codes prescribed by both legal and medical
associations.
In his report, the psychiatrist said Mrs. Walden
had never had a psychiatric history; at the time of
her committment, she did not exhibit any symptoms of
psychosis serious enough to warrant her committment
to Western State. This institution usually becomes
the repository of mental patients who have failed to
respond to rehabilitative therapy at the Tennessee
Psychiatric Hospital in Memphis.
Someone in the City of Memphis government first
had Mrs. Walden committed in the City of Memphis
Hospital's psychiatric ward which is under the control of the Memphis police department. At that
facility, patients undergo only brief therapy, and
are either discharged or committed for short 'range
therapy -- sometimes lasting less than a week and
sometimes lasting three months -- at the Tennessee
Psychiatric Hospital three blocks away in Memphis.
Charles Murphy, a Memphis attorney who later was
retained to represent Mrs. Walden, was eventually
successful in gaining an adjudication that Mrs. Walden was illegally committed.
Murphy said when Mrs. Walden was rushed from the
rooming house to the City of Memphis Hospital's
psychiatric ward, she had been recovering from an
operation for a rare skin disease. She had been an
alcoholic and had been rehabilitated under an AA
program that met at the Tennessee Psychiatric Hospital.
"She had been sober for a month before King's
death, and she had been sober for a month afterwards, right up until the time of her committment,"
Murphy said.
The normal procedure would have been to have
turned Mrs. Walden over to a clinical psychiatrist
at the Tennessee Psychiatric Ilospital for an evaluation and for a short-range commitment at the Memphis institution before she would be sent to Western State.
"They bypassed the entire procedure," Murphy said.
"She was in the City psychiatric ward less than a
day before she was transferred to Western State, 60
miles away."
(more)

27

Murphy cites Mrs. Walden as the source of the
report that Stephens, her common-law husband, was
induced to change his story by the blandishments of
the British newspaper man.
"They had to get rid of me to make Charlie's story
stand up in court," Murphy quoted Mrs. Walden as saying.
Meanwhile, while Charlie Stephens was in the protective custody of the FBI, another frequent female
companion of Stephens met an unfortunate fate -one more fatal than Mrs. Walden.
Mrs. Walden Illegally Committed

"She was found beaten to death in a vacant lot,"
Murphy said.
Murphy, in a brief filed in the Circuit Court in
Hardeman County, Tenn., where Western State Hospital is located, charged that members of the Shelby
County Attorney General's office, the FBI, and the
Memphis police department illegally conspired to
commit Mrs. Walden to a psychiatric institution for
two reasons:
First, to destroy her credibility as a witness
in case she gave testimony that conflicted with
Stephens at Ray's trial; and,
Second, to get her out of Memphis and away from
newsmen who might tell her version of the events
that occurred in the ~ooming house on the night Dr.
King was slain.
Aftermath of King's Assassination

Dr. Martin Luther King Jr., Nobel Peace Prize
recipient, preached non-violence, but on April 4,
1968, Dr. King became a victim of the very virulence
he preached against. A sniper killed him with a
rifle as he stood on a Memphis motel balcony.
Less than two hours later, the shot had echoed
around the world. Guerilla warfare erupted in the
largest cities of the nation -- a pattern of violence unfolded in a manner not entirely unlike the
hi t and run tactics of the Viet Cong in South Vietnam.
Less than a week before, President Lyndon Johnson
had virtually abdicated by announcing he would not
run for a second elected term, and that he was going
to wind down the Vietnam War -- a sharp and surprising reversal of the escalation policies he had
forced on the nation for the past three years.
The more despairing right-wing columnists seethed.
They lamented that President Johnson -- once the
hawk's hawk -- had capitulated to the subversive
forces both domestically and abroad. The monolithic
forces of international Communism had not only penetrated the perimeter of domestic U.S. security, but
had deployed its insurgent forces in our city to
break down law and order.
Only with this background in mind, can one effectively evaluate the meaning and significance of Dr.
King's death.
Also, the perspective would not be complete unless
one recalls that Dr. King at this point of his career
had amassed a formidable coalition of blacks, Chicanos,Indians and poor whites for his Poor People's
March on Washington, D.C. It would begin in June -less than two months away. It would begin its long,
hard trek in Memphis and points in North Mississippi.

28

This would be during the first hot month of what
many urbanologists predicted would be another volatile and violent summer. Shock tremors were still
in the air from the summer before when racial violence rocked Newark and Patterson, N.J., and Detroit,
Mich.
King's Killer a Racist

Dr. King had done more than any other man to
break down the barriers of governmentally sanctioned
segregation in the south. He had just then began to
expand his civil rights movement and mobilize the
strength of his supporters in the Southern Christian
Leadership Conference to uproot other social, economic and international injustices.
But it was his effectiveness as a civil rights
leader breaking down the segregation barriers that
made most persons -- including intellectuals on the
right and the left -- assume that a conspiracy, if
it did exist, must have been rooted in racism.
Thus, Dr. King's killer had to be a racist. l
After all, why was King in Memphis at the time he
was killed? This was the question most often asked
by those who suspected that racism alone provides
the clues to explaining King's death.
These people would argue that a two month old
sanitation strike by black workers against the City
of Memphis had released a latent racism among city
political leaders -- a racism that had been assumed
by more enlightened citizens to have been sublimated,
if not extirpated by its roots, by a prior liberal
city administration that had integrated schools,
restaurants, public parks and had prevented violence
in the tense summer of the year before.
However, those who suspect racism alone provides
an entire explanation as to why King was killed
failed to perceive the more variegated social background upon which King's assassination had impinged.
By early 1968, Dr. Martin Luther King had evolved
into something more than a black civil rights leader.
He led one of the most dynamic coalitions in the
nation -- a coalition that could bring its influence
to bear on international as well as domestic issues.
The "paranoid patriots," a term used by Rev.
James Lawson, had begun to think of King as a
"national security threat." Yet King's organization
and other protest groups had just succeeded in "turning President Johnson around on the Vietnam War".
A Grave Domestic Situation

If those who espoused the hard-line, cold war mentality could regard a civil war in an underdeveloped
Southeast Asian nation less than 20,000 miles away
as an immediate and direct threat to America's
national security, imagine how these cold warriers
would evaluate the gravity of a domestic crisis.
They would claim it was caused by the confrontation
of protest groups, which had just turned a hawkish
President around on the Vietnam War, marching to the
nation's capital and demanding reform legislation
from Congress. Assembled in the nation's capital
city, could not such a formidable group force Congress into shifting its priorities from needs of
national defense to domestic reforms?
If one put himself in the mind of one of the "pnranoid patriots", could not the Poor People's March
in June 1968 be viewed as critical as the urban con-

COMPUTERS and PEOPLE for December, 1974

frontation in Moscow in 1917? If the domino theory
haunted these so-called paranoid patriots, think
what terror may have flashed across their minds when
they pondered the domestic effects of the Poor
People's March and their demands on the U.S. Government in the nation's capital? Could not this be
deemed a surgical thrust at the nation's jugular
vein'?
As Sen. Ervin's subcommittee would reveal two
years later, the military reflected this frenetic
fear and pathological preoccupation with the threat
of domestic subversion when it launched its massive
surveillance program against the civilian population
of America.
Conducted by the Army military intelligence, the
program assigned military counter-intelligence agents
to spy on civilians, to compile exhaustive dossiers
on leading liberal leaders in Congress, prominent
judges, and active civil rights workers. The purpose
of these investigations, according to the defenders
of the system, was to produce intelligence needed
in the event that disruptive, crippling, urban guerilla warfare did break out in America.
This cold war atmosphere
characterized by the
"enemy within" syndrome - had reached its apogee in
the months shortly before King's death.
Footnote

1. Huie and Frank both strongly contend that Ray
killed King because he was a racist. Relatives
and acquaintenances who knew Ray when he was growing up in East St. Louis, and Alton, Ill., said they
never heard him express any racial animosity. Dr.
McCarthy DeMere, a prominent physician who is also
a licensed attorney and professor of forensic law
and medicine, spent almost six months with Ray at the
Shelby County jail. DeMere said he never heard Ray
express any hostility toward blacks. An Establishment figure, DeMere is a reserve deputy sheriff and
a friend of the then sheriff, Bill Morris, who
asked him to leave his medical practice and take on
an assignment of protecting Ray's health on a daily
basis, up to the time of the trial. Dr. DeMere and
Sheriff Morris, unlike most members of the Memphis
establishment, have expressed on occasions doubts
that Ray acted alone in the King slaying. Also,
probably no other two men spent as much time with
Ray as DeMere and Morris.
D

Editorial Note: As is clear from the articles which we have
published, the "true" story of the assassination of Martin
Luther King and any conspiracy behind it, is not complete.
. So these articles should be looked on as a preliminary report.
For information in regard to the book on this subject by
Wayne Chastain, please write to him.
Corrections:
On page 5 of the July, August, September, October, and
November issues of Computers and People, change the
author's name "Wayne C. Chastain" to "Wayne Chastain".
In Part 8, page 27, left column, line 10 from the top,
change "definitely the man" to read "definitely not the
man".
In Part 9, page 26, left column, line 5 from the top,
and same page, right column, line 7 from the bottom, change
"Willie O. Stephens" to "Charles O. Stephens".
In Part 10, first paragraph,. delete the final remark in
parentheses.

COMPUTERS and PEOPLE for December, 1974

MACDONALD - Continued from page 11

Motor Vehicles. Take a look at your Blue Cross card
••• chances are you'll find the same number.
In the computer age, the details of your personal
life have become so accessible as to seriously threaten the entire idea of privacy. AND THERE IS NO POLITICAL FREEDOM WITHOUT PRIVACY I
Today, the "Social Security" number has been
transformed into a Universal Identifier. Linked by
computer tape from one data bank to another, it potentially allows anyone who has it to obtain information about you from anyone else who has it.
Consider just a few examples of how your life is
recorded:
- The US Treasury Department now requires banks
to keep a microfilm record of every sizable
check you write. Most banks simply record all
your checks. Government agencies may then inspect these records without your knowledge or
permission. Your banking transactions are a
mirror of your entire life ••. the groups you
join, the doctors you consult, the causes you
support.
- Private dossier companies, called credit bureaus,
maintain secret files on over 50 million Americans, containing information not only on your
finances, but personal information such as who
your friends are, what your habits are, what
your neighbors or co-workers think of you.
These credit bureaus are protected by federal
law from your efforts to see your own file or
adequately challenge its accuracy. Next time
you are mysteriously denied insurance, or credit, or a job, the chances are it's because of
what's in your file.
- In Massachusetts, whenever you receive in-patient psychiatric treatment, your name, Social
Security number, diagnosis and course of treatment are reported to the Department of Mental
Health. Among the recipients of this information are insurance companies, chiefs of police,
the Registry of Motor Vehicles, and all other
licensing authorities. The Department has plans
for extending this data bank to people getting
out-patient services as well.
WHAT CAN YOU DO? By yourself, not much. But you
can join forces with 275,000 other Americans (9,000
in Massachusetts) who are defending their rights
through membership in the American Civil Liberties
Union. Right now the ACLU and its affiliate, the
Civil Liberties Union of Massachusetts are pressing
for urgently needed legislation that will help control government access to the intimate details of
your life.
Even more important, the ACLU can be counted on
to fight back whenever individual rights are threatened by abuses of government power. If these rights
are to be preserved, and government is to be the
servant rather than the master of its people, a
strong Civil Liberties presence must be maintained
from the smallest hamlet, through state government,
to Washington, D.C.
Be a part of that presence. Join the one organization whose sole purpose is to assure that our
government does not exceed its authority in the exercise of its power.

29

GAMES AND PUZZLES for Nimble Minds

and Computers
Neil Macdonald
Assistant Editor

It is fun to use one's mind, and it is fun to use the
artificial mind of a computer. We publish here a variety
of puzzles and problems, related in one way or another to
computer game playing and computer puzzle solving, or

SIXWORDO
In this puzzle, the problem is to paraphrase a passage (a
series of connected sentences) making every new sentence
no longer than six words, the meaning to be just the same.
According to the dictionary, to paraphrase means to restate a text or passage giving the meaning in another form;
in this case there is no requirement to change or alter any
word - only the requirement of producing sentences no
longer than six words.
This puzzle has a serious purpose. Its purpose is to test
the following argument:
1. A computer is to be programmed to understand ordinary language.
2. Suppose an agreement is made that no sentence shall
be longer than n words.
3. Then it should be much easier to program the
computer.
4. n should be chosen so that it is not very difficult for
human beings to paraphrase passages into sentences
of not more than n words.
5. A reasonable value for n is 6.
Note that it may well be that n should be 7 or 8; and if it
should stay as small as 6, then possibly the human paraphraser should have the option of defining terms about
which assertions are being made (which is a common option
in all of mathematics).

SIXWORDO PUZZLE 7412

Problem: Compare the following passage a (SIXWORDO
PUZZLE 7411) and a proposed SIXWORDO solution, b.
What ideas does the paraphrase b miss? Can you improve
the paraphrase still keeping to sentences of not more than
6 words? Any comments?
a Consider the machines, equipment, and supplies - the

technology - for informing people in general about what
is going on in the world. That technology becomes more
and more expensive, more and more powerful. Along the
road of development and progress of that technology, there
is a place where all that technology has become so expensive and so powerful that it is monopolized and controlled
by the establishment. When that place is reached, it produces the predictable end of the rights of an ordinary
citizen to be informed, to know the truth, to hear conflicting sides to the news and to arguments. (Hint: One
solution contains 17 sentences.)

30

to the programming of a computer to understand and
use free and unconstrained natural language.
We hope these puzzles will entertain and challenge
the readers of Computers and People.

b Technology consists of machines, equipment, supplies.
Consider technology for informing people generally. The
information deals with news, happenings. The information
deals with the world. The technology becomes ever more
expensive. The technology becomes ever more powerful.
The technology steadily develops and progresses. Finally
it becomes extremely expensive. And extremely powerful.
So the establishment monopolizes it. And the establishment
controls it. Ordinary citizens are no longer informed. They
no longer hear arguments. They no longer hear conflicting
versions. They no longer know the truth. Citizens' rights
to know cease. This is a predictable end result.

NAYMANDIJ
In this kind of puzzle an array of random or pseudorandom digits ("produced by Nature") has been subjected to a
"definite systematic operation" (chosen by Nature") and
the problem ("which Man is 'faced with") is to figure out
what was Nature's operation.
A "definite systematic operation" meets the following
requirements: the operation must be performed on all the
digits of a definite class which can be designated; the result
displays some kind of evident, systematic, rational order and
completely removes some kind of randomness; the operation
must be expressible in not more than four English words.
(But Man can l,lse more words to express it and still win.)
NAYMANDIJ PUZZLE 7412

6 7 8
640
2 4 8
5 4 9
6 7 3
9 1 3
2 9 3
3 7 9
2 9 9
2 2 6

8 1 0 1 0 0 9 0 0 4 364 6 4 2
604 604 0 8 8 6 804 886
384 0 6 9 741 444 901 5
5 270 3 2 2 7 3 6 8 8 2 267
8 7 554 7 7 347 899 8 7 6
5 5 9 1 001 454 869 2 5 7
601 154 1 8 1 6 823 2 3 9
7 3 664 259 1 000 334 8
7 6 1 4 8 854 9 5 7 7 225 5
0 495 566 1 0 8 448 794

9
6
8
3
0
0
9
8
7
6

COMPUTERS and PEOPLE for December, 1974

NUMBLES

GIZZMO

A "numble" is an arithmetical problem in which: digits
have been replaced by capitallettersj and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits. Each capital letter in the arithmetical problem
stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message,
which is expressed in numerical digits, is to be translated
(using the same key) into letters sO that it may be read;
but the spelling uses puns, or deliberate (but evident) misspellings, or is otherwise irregular, to discourage cryptanalytic methods of deciphering.

The problem is to grasp relations between things that ar~
not identified in the usual way - their names cannot be
looked up in the dictionary - and then solve a problem
involving them.

NUMBLE 7412
T H E

x H E A R T
R I L S
E T S R
e

GIZZMO 7412

GONDS may be roughly divided into those that are based
on ongoing ALUNS and those that are founded on some material ENGADS. There are of course other ways in which
GONDS may be classified: some are about devices to prevent bad luck; others are about devices to produce good
luck. Each class of GOND may be divided into those that
are generally believed, and those that are private and individual. The second class is more interesting and includes
GONDS that are due in general to no outside influence;
they come into the mind privately, and hold a place there
that is usually unknown to anyone else. These originate
from some experience; reasoning backwards, the individual
tries to find some ALUN or ENGAD which he thinks is
responsible for his bad luck or good luck.
What is a GOND? an ALUN?an ENGAD?

OONT
A
ATI

=
'S

X

E 100 L L R S

49190

16395

e

*

0*

8 <) ";]
t.> 0 > 0*
X 0 if- ·l- 008)(* , EX

-,. 0¢X

1

<:)

EI -I-

We invite our readers to send us solutions. Usually
the (or "a") solution is published in the next issue.

SOLUTIONS

.S

MAXIMDIJ 7411: Work is the key to rest.

1m
:;

NUMBLE 7411: Money steals the soul.

MAXIMDIJ

NAYMANDIJ 7411: Sequence column 12.

In this kind of p~zzle, a maxim (common saying, proverb, some good advice, etc.) using 14 or fewer different
letters is enciphered (using a simple substitution cipher) into the 10 decimal digits or equivalent signs for them. To
compress any extra letters into the 10 digits, the encipherer
may use puns, minor misspellings, equivalents like CSor KS
for X or 'vice versa, etc. But the spaces between words are
kept.

MAXIMDIJ PUZZLE 7412

*7*1:j
#1:)*+$

+0Q6)

~(j*

ax

COMPUTERS and PEOPLE for December. 1974

o*'*

0
8
6
9
8
5
8
0
9
8

7
3
1
0
6
6
7
3
9
0

8
4
2
4
0
3
8
9
2
0

7
7
4
7
0
7
7
5
0
4

9
0
3
5
2
8
1
5
6
9

4
8
5
3
0
5
6
7
7
9

1
4
0
0
2
5
4
4
8
8

5
4
8
7
1
4
1
5
1
3

7
9
6
6
2
7
1
9
6
0

0
2
3
4
5
6
9
5
1
4

3
0
5
5
3
5
2
9
5
8

1
2
3
3
3
4
5
5
7
8

8 7 9
0 1 6
4 3 8
0 2 7
6 6 7
1 1 7
4 5 5
2 9 8
1 7 6
3 5 8

2
9
8
5
2
5
0
1
8
1

2
3
7
9
5
3
6
5
7
6

0
6
2
1
0
7
3
8
9
2

4
5
2
2
8
1
6
7
4
4

4·
4
3
3
8
1
1
5
0
9

Our thanks to the following individuals for sending us
their .solutions to - NA YMANDIJ 749: John Waters, Atlanta, Ga. - NUMBLE 7410: Maj. G. A. Strassburger,
Ft. Meade, Md.

31

Computing and Data Processing Newsletter

COMPUTER GIVES NEW MEXICO MUSEUM
FULL ACCESS TO ITS MINERAL COLLECTION
Jack B. Pearce
New Mexico Institute of Mining and Technology
Socorro, NM 87801

"X-ray analysis enables us to identify any unknown minerals or chemical compositions in the specimen, as well as any crystalline structure," Dr.
Renault said. "It's very much like a fingerprint."

The prospector of years past learned to identify
rocks and minerals by sight as he probed for gold
and silver in the rocky deserts of the Southwest.
Today these same minerals are on display in a museum in Socorro, New Mexico - and a computer identifies each one by X-ray analysis.
In addition, the computer keeps a complete record
of each of the 9,200 sepcimens at the New Mexico
Bureau of Mines Mineralogical Museum. The collection, while emphasizing southwestern minerals, also
displays other geological and mineral specimens
from around the world.

-- Halite, crystallized on this bush from California's Salton Sea, gets a careful dusting
from Charles Grigsby, assistant curator of the
New Mexico Bureau of Mines Mineralogical Museum.
The museum was begun in the early 1900's. It was
maintained by the Institute of Mining and Technology
until 1964, when it was turned over to the Bureau of
Mines. "Much of the material had never been classified," explained Dr. Jacques Renault, a geologist
who also teaches at the New Mexico Institute of Mining and Technology. "Some of it was in cardboard
boxes and desk drawers. Several people tackled the
job, but it was an immense task.
"Finally we decided a computer could handle it
better than any team of individuals possibly could
because of the tremendous amount of statistical work
involved. So in 1969 we began working up a computer
file that recorded various information about each
specimen."
Mineralogists punched computer cards that catalogued the various minerals in each item, other geological details, its donor or source, when acquired
and its location in the museum. Later they began
using the computer to analyze the mineral content of
each sample.
32

-- This delicate mineral specimen containing
goethite and psilomelane was found in Socorro,
N.M. It and 9,200 other samples from around
the world have been catalogued and X-ray analyzed by computer.
Every mineral diffracts X-rays in a characteristic pattern because of the atomic spacing in the
crystal. It is relatively simple to determine the
diffraction patterns for all minerals commonly
found in the Southwest and reduce these data to
mathematical tables. Then, by comparing the results
of any diffraction test with these standard tables,
experts can identify the minerals present in the
sample.
"As a result we
tips," Dr. RenaUlt
every sample of -museum, we can get

have everything at our fingersaid. "When we want a list of
for instance -- cerussite in the
it back from the computer in just

COMPUTERS and PEOPLE for December, 1974

a few seconds. Equally important, we can find it
immediately because the printout gives each sample's
exact location."

'ion

Similar speedy computer search techniques can
turn up all minerals from any geographic area or
from anyone donor. The computer is an IBM System/360-44.

-

"Research is the reason for our existence," Dr.
Renault said. "The computer helps make this museum
a living research facility."
COMPUTER SYSTEM FOR A RACING YACHT THAT WON
Bob Palmer
Data General Corporation
Southboro, MA 01772

In September 1974, the winner of the America Cup,
the yacht Courageous, carried a minicomputer aboard
for navigational and tactical calculations. The
computer was the heart of a special system developed and built by Dick McCurdy, a consultant to the
Courageous Syndicate. Halsey Herreshoff, navigator,
used the system during the trials this summer and
during the final four victories over the Australian
challenger, Southern Cross.
After the races, McCurdy stated:
"Overall, the computer system exceeded my expectations. In spite of the rough conditions, the computer was operational over eighty percent of the
time. It did everything we wanted it to, and more
it was a great success.
"The most important task done by the computer was
to predict the apparent wind in the next leg of the
race. This information allowed Courageous to select
the right spinnaker every single time."
The Navigator, Herreshoff, commented:
"The computer was a big help to us. It has added
a new dimension to sailing by giving us information
never before available, like the predictions of apparent wind. Especially valuable was the constant
and rapid updating of information by the computer.
For instance, when there was a wind change as we
approached the weather mark, we immediately knew
what our revised apparent wind would be on the next
leg. We were able to change our choice of spinnaker
at the last minute, which was a real advantage."

.,

The computer supplements the expertise of the
skipper and crew by doing navigation calculations
that are needed to obtain the best speed from the
craft. There is not time available in a race to do
all of the calculations manually. Most of the
yacht's instruments are connected to the computer;
they supply signals representing apparent wind speed
and direction, boat speed, heel angle, compass
course and other variables.
At any time, the navigator can "ask" the computer
to display the true wind speed and direction, which
are updated four times a second. Because true wind
speed and direction cannot be measured directly on
a moving vessel -- they can only be calculated from
instrument readings - this is an ideal computer
task. Knowing true wind speed and direction enables
the navigator and tactician to make decisions on how
to race the course.
Among the other tasks of the computer is the calculation of a quantity called "speed made good to
windward." This indicates actual forward progress
COMPUTERS and PEOPLE for December. 1974

in a tacking situation. Tacking is the technique of
sailing into the wind by a back and forth course,
making some forward progress each time. The computer can calculate this forward progress from the instrument inputs. The computer can also compare
tacking patterns and help establish the most efficient system of tacking.
While these calculations may seem routine, the
computer's location certainly is not. The yacht's
cockpit is open to the sea and air, and there is no
110-volt power available. There is just enough room
for the 11 crewmen to move around. The computer
chosen was small and light and the power supply permitted an easy conversion to 36-volt dc operation.
Three automobile batteries would keep the system
running for 10 to 12 hours, and they could be recharged each night.
The computer was housed in a suitcase-sized,
weatherproof metal box that hung beneath the cockpit
sole. The computer and the box weighed less than
70 pounds. The computer was cooled by a batterypowered circulation system, and coolant was bilge
water. The computer was a NOVA 1200 computer supplied by Data General.
Communication between the navigator and the computer system was handled by a compact station mounted at the chart table next to the helm. A32-channel
scheme produced a four-digit-plus-sign display.
Manual inputs and commands were entered with a touchpad; the desired display is selected with a series
of switches. All this takes but a few seconds, and
the calculation result appears almost immediately.
CAMERAS AND COMPUTERS COMBINE
TO ANALYZE ROCKET FLIGHTS
Kent Roberts
New Mexico State University
Box 3548
Las Cruces, NM 88001

Rockets streaking across the skies at more than
four times the speed of sound are being studied
every second of the way by scientists at the Physical Science Laboratory, at New Mexico State Univ.
Using a computer and high-speed cameras, the scientists collect and analyze information on rockets,
missiles, and other aircraft tested at White Sands
Missile Range near here.
The computer is used in many areas where precise
measurements and calculations are necessary including: determining where to put cameras to obtain the
best filming angles; analyzing measurements from
thousands of feet of film taken during flights; and
compiling reports on flight performance.
"The computer reports enable engineers to determine if aircraft performed the way they were designed to," said Keith Hennigh, data processing
division manager of the laboratory. "If the flight
didn't conform to plans or if a malfunction occurred,
the computer analysis points out what went wrong.
Modifications and design changes are made accordingly."
Using information such as estimated speed and
intended path of the aircraft, the computer calculates ideal camera locations. As many as 20 cameras, some capable of taking 5,000 frames a second,
can be used during tests. Following the flight,
the film is processed and frames not related to
measurement data are edited out.

33

Film readers connected to a projector measure
the position of the aircraft on each film frame.
Reference points such as surveyed targets, poles or
stars are used to determine camera orientation and
to calibrate the camera lens. When no reference
points are in the field of view, cameras with precalibrated lenses are used.

flight parameters including position, velocity, acceleration, object attitude, roll rate, and other
requested information. An entire flight mission
can be analyzed in 24 hours using the computer.
"Before the computer system was installed, many of
our calculations would have taken weeks, " Mr.
Hennigh said.

As each frame is measured, information enters a
Serial Encoded Data Exchange (SENDEX), a device designed and developed by PSL employees to convert
measurements into computer readable form.

The laboratory employs almost 200 New Mexico
State students in its various ~rojects. Many of
them are involved in a variety of highly skilled
jobs as film readers, computer operators, programmers, and keypunch operators.

A second computer arranges film frames from each
camera in their proper sequence. It is also programmed to analyze trends in the measurement readings before it transfers the information to the
first computer.
The computer combines film measurements with information collected by electronic equipment aboard
the aircraft to provide a highly detailed analysis
of a flight.

The Physical Science Laboratory is a non-profit
organization providing support for military and
federal agencies. The two computers are an IBM
System/370, Model 135, and an IBM System 7.
Antley - Continued from page 25

2. Slack W.V., VanCura L. J.: Computer-based Patient
Interviewi ng. Post-graduate Med 43 :68-76, 115-120,
1968
3. Grossman J. M., Barnett G. 0., McGuire M. T., et
al: Evaluation of computer-acquired patient histories. JAMA 215:1286-1291, 1971
4. Mayne J. G., Weksel W., Shol tz P. N.: Toward automating
the medi cal hi story. Mayo Cli n Proc 43: 1-25, 1968
5. Kanner I.F.: The programmed physical examination
wi th orwi thout a computer. JAMA 215:1281-1291,1971
6. Diebold J.: "Man and the Computer," Avon Books,
New York City, p. 161-2, 1969
7. Cadden J. J.,: Flach F. F., Blakelee S. and Carl ton R.:
Growth in medical students through group process.
Amer J. Psychiat 126:862-868, 1969
8. Kubler-Ross E.: "On Death and Dying," The MacMillan Company, New York City, 1969

U nsettl i ng, Disturbi ng, Critica I
Compu ters and People (formerly Computers and
Automation), establi shed 1951 and therefore the
oldest magazine in the field of computers and data
processing, believes that the profession.of information engineer includes not only competence in
handling information using computers and other
means, but also a broad responsibiiity, in a professional and engineering sense, for:
The reliability and social significance of
pertinent input data;
The social value and truth of the output
results.
In the same way, a bridge engineer takes a professional responsibi li ty for the reliabi li ty and
significance of the data he uses, and the safety
and efficiency of the bridge he builds, for human
beings to risk their lives on.

-- Flight patterns of rockets, such as the one
being launched above, are being studied by scientists at New Mexico State University using
cameras and a computer.
The system is programmed to take into consideration any factors which may affect the flight including wind and atmospheric conditions, and enables engineers to study and analyze the flight
from the instant it begins to completion. The computer report provides information on a variety of

34

Accordingly, Computers and People publishes from
time to time articles and other information related
to socially useful input and output of data systems
in a broad sense. To this end we seek to publish
what is unsettling, disturbing, critical -- but
producti ve of thought and an improved and safer
"house" for all humanity, an earth in which our
children and later generations may have a future,
instead of facing extinction.
The professional information engineer needs to
relate his engineering to the most important and
most serious problems in the world today: war,
nuclear weapons, pollution, the population explosion, and many more.

COMPUTERS and PEOPLE for December, 1974

A fabulous gift:
18 illustrations in pen and ink

"RIDE THE EAST WIND:

Parables of Yesterday and Today"

by Edmund C. Berkeley, Author and Anthologist
The Fox of Mt. Etna and the Grapes

Published by Quadrangle/The New York Times
Book Co., 1974, 224 pp, $6.95

Once there was a Fox who lived on the lower slopes of
Mt. Etna, the great volcano in Sicily. These slopes are extremely fertile; the grapes that grow there may well be the
most delicious in the world; and of all the farmers there,
Farmer Mario was probably the best. And this Fox longed
and longed for some of Farmer Mario's grapes. But they
grew very high on arbors, and all the arbors were inside a
vineyard with high walls, and the Fox had a problem. Of
course, the Fox of Mt Etna had utterly no use for his famous ancestor, who leaping for grapes that he could not reach,
called them sour, and went away.

Table of Contents
Part 1. The Condition of Man
Pandora and the Mysterious Box / H. A. Guerber
The Garden of Parad ise * / Hans Christian Andersen
*to which the King's son was transported by the East Wind

The Fox decided that what he needed was Engineering
Technology. So he went to a retired Engineer who lived on
the slopes of Mt. Etna, because he liked the balmy climate
and the view of the Mediterranean Sea and the excitement of
watching his instruments that measured the degree of sleeping or waking of Mt. Etna. The Fox put his problem before the Engineer.

The History of the Doasyoulikes / Charles Kingsley
The Locksmith and the Stranger / Edmund C. Berkeley (B)
The Elephant and the Donkey / James Reston
Where that Superhighway Runs, There Used to be a
Cornfield / Robert Redfield
The Fire Squirrels / B
Part 2. On Flattery and Persuasion

The Bear and the Young Calf / B
The Bear and the Young Beaver / B
The Wasps and the Honey Pot / Sir Roger l'Estrange
The Six-Day War and the Gulf of Dong / B
The Deceived Eagle / James Northcote
Missile Alarm from Grunelandt / B
The National Security of Adularia / B
Doomsday in St. Pierre, Martinique / B

The Crow and the Fox / Jean de La Fontaine
The Visitor who Got a Lot for Three Dollars /
George Ade
The Cuckoo and the Eagle / Ivan A. Kriloff
The Wind and the Sun / Aesop
The Lion in Love / Aesop
The Crow and the Mussel/Aesop, B
The Two Raccoons and the Button / B

Part 7. Problem Solving

Part 3. On Perseverance and Resourcefulness

The Wolf and the Dog of Sherwood / Aesop, B
The Three Earthworms / B
The Hippopotamus and the Bricks / B
The Cricket that Made Music / Jean de La Fontaine, B
The Fox of Mt. Etna and the Grapes / B
The Mice of Cambridge in Council/Aesop, B
Brer Badger's Old Motor Car that Wouldn't Go / B
The First Climbing of the Highest Mountain in the
World / Sir John Hunt, B
The Evening Star and the Princess / B

The Crow and the Pitcher / Aesop
Robert Bruce and the Spider / Sir Walter Scott
Hannibal Mouse and the Other End of the World / B
The Fly, the Spider, and the Hornet / B
Part 4. Behavior - Moral and Otherwise
A Small Wharf of Stones / Benjamin Franklin
The Three Bricklayers / Anonymous, B
The Good Samaritan / St. Luke
Much Obliged, Dear Lord / Fulton Oursler
The Fisherman, the Farmer, and the Peddler / B

Notes
Part 5. The Problem of Truth
On Being a Reasonable Creature / Benjamin Franklin
The Monkey and the Spectacles / Ivan A. Kriloff
The Golden Trumpets of Yap Yap / Mike Quin
The Barrels and the Pittsburgh Manufacturer / B
The Empty Column / William J. Wiswesser
The Differences in Two Strains of Corn / Edgar Anderson
The Six Blind Men of Nepal / B
The Sighting of a Whale / B
The Stars and the Young Rabbit / B
The Ocean of Truth / Sir Isaac Newton
Part 6. On Common Sense
The Lark and her Young Ones / Aesop
The Bear and the Young Dog / B
COMPUTERS and PEOPLE for December, 1974

Some Collections of Parables and Fables
RETURNABLE IN 10 DAYS FOR FULL REFUND
IF NOT SATISFACTORY
(You can read it all in 10 days - and keep it only if
you think it is worth keeping.)

HOW CAN YOU LOSE?
-

-

-

To:

-

-

-

-

(may be copied on any piece of paper) -

-

-

-

-

-

Berkeley Enterprises, Inc.
815 Washington St., Dept. R 12, Newtonville, MA 02160
Please send me _ _ _ copy(ies) of Ride the East Wind:
I enclose $7.00 per copy !includes handling).
Total enclosed

(Prepayment is necessary)

My name and address are attached.
35

-

-

-

-

.

WILL YOU HELP?

Please give us their names and addresses on the
form below or add another sheet of paper. Trim out the
card with scissors and drop it in the mail. We'll gladly
pay the postage to learn of possible new friends. And many
thanks for your help! As a token of our appreciation we'll
send you our ****Reprint.

Yes, you. It may come as a surprise that you'd be asked
... but as a reader of Computers and People (formerly
Computers and Automation) you are in a unique position
to help us.

P.S. If you like you may mail your list separately to:
R. A. Sykes, Circulation Mgr.
Computers and People
815 Washington Street
Newtonville, MA 02160

NAMES ... people, institutions, companies who should
be interested in 1) the computer industry and/or 2) seeking truth in information are very much needed to join you
as readers of Computers and People.
Will you tell us who they are? And perhaps even more,
will you let us use your name in writing to them? But
with or without your name (we'll only use it if you grant
permission) we need to know those you think might be
interested in also read ing Computers and People.

* *" * *"

cut here and tuck in flap

r--------------------------,
TO:

I
I
I

cornJ:!,~a~!!n!:~

:

I suggest you send information on Computers and People \
to ... (attach list if you like)

\

\
\

(1)Name_________________________________

\
\

Address______________________

I
lI

e
tVl

\

City _ _ _ _ _ _ _ _ _ State ______ ZIP____

~,

Science and the Advanced Society, by C. P. Snow, Ministry
of Technology, London, England (April 1966)
The Information Revolution and the Bill of Rights, by
Dr. Jerome B. Wiesner, M.LT. (May 1971)
Employment, Education, and the Industrial S~stem, by
Prof. John Kenneth Galbraith, Harvard Umv. (Aug. 1965)
Computers and the Consumer, by Ralph Nader,
Washington, D.C. (Oct. 1970)

\
\

:
I
I
I

reprint from

R. A. Sykes, Circulation Mgr.
Computers and People

\~
\~
\~

:; I

u,

(2) Name'_____________________________________

I
I

Address___________________

I
I
I
I

:

\~

,.

I

\
\

\

\
\

City

State

0 YES

May we use your name?

\
\
\
\
\
\
\

ZIP ______

0 NO

I Please give us your name and address on the form belo.w .so we can

,

: send you your ****Reprint. Just cross out the subscription request
- unless you also want to enter your new or renewal order.

I

-

-

cut here

-

__ _

~

~
..J

U
I-

''0

~

• 1;

~

·~

ci z·
Z

4l

l-

L1.

a:

~

0

e/)

:1l

III

e

Name:~_ _ _ _ _ _ _~

$23.50·

0

$11.50

lJ

w

I-

Country if not U.S.: ______

OJ

OJ

:J

c;,

{:

0

c

OJ

lJ
OJ

III

co

1;;

E

I
III
..J

~
~

OJ

w

c.

a:

E

Z
Ci.j

:::J

III

W
...J
W
~

a:
W

en

>-

en

~
a..

>..J

w

>-

....>
U
C

~
VI

OJ
Cl

~0

c.
0

Z

0

w

0

~
OJ

c

Z

....

a..

(/)
(/)

Add ress: __________________.
City:

::J

Q.

~

a:
a:

c

2

Organization: _ _ _ _ _ _ __

a..

.~

~

Title: ___ ~_ ._~ __ _

w

en

~

~

0

One Year (excluding the Computer Directory and Buyers'
Guide - - 12 issues) U.S. only.

vi

II

Guide - - 13 issues) U.S. only.

Z

VI

Q;

One Year (including the Computer Directory and Buyers'

U

w

a..

~

start my subscription to
COMPUTERS AND PEOPLE
according to the instructions checked below.

''0

· c

do not cut

YES,

.~

0

l-

a:

:]

e/)

e/)

____________ Fold here ''0

""" en

M
Ln
M
M

__ _

w
en
...J
...J

3:
w
<.:J

«

I-

en
0

a..

co

w E
0

-I

+-'

::l
c.. c:x:

0

W
0..

Q

Z

«
Cf.)

co
Vl

10...

OJ
+-'

::l

Q.

E

0

0:

u

l-

t

w

:::>

~
~ -E
0
0..

U

0

(0

"0

c

aJ

+'"
Cl)
Q,)

N
0

~

+'"

en

c::

0

+'"

C)

c::

«
~

!E."

.J:

.:;;

$:

+'"

en
CO

-

c::

0

LO

:1:
Cl)

CO

Z

o
o

OJ

Payment enclosed
Bill me

o
o

:J

Renewal

c;,

New subscription'

0
OJ

To SPEED the processing of your order, please check the one best
desuiptor in eath of the two categories below. (ThIs InformatIon
\\ ill be used for statist ita I purposes only.)

BUSINESS TYPE
Ol-Computer Manufacturer
02-Aerospace ! Aircraft
Manufacturer
03-other Manufacturing
04-Raw Materials Processing;
(chemical, primary metal,
petroleum, food. etc.)
OS-Mining and Construction
06-Computing & Consulting
07-Finance, Insurance, Pub!',
and Service Organizations
OB-Transportation Companies
09 -Public Utilities
, O-Research
"-Wholesale, Retail, Sales,
and Marketing Firms
, 2-Educational; (College,
University, or School)
, 3-Government and Military
, 4-Libraries

I

\,

B I

Signatu re: ___ ~_

'';:::;

I

State: _________ Zip

JOB FUNCTION
I-Technical Management; (computer
installation management, program
management, or engineering mgmU
2-Computer Center Personnel;
(methods & procedure analysts,
and operators)
J-Programming Personnel; (systems,
application & research programmers)
4-Professional: (systems analysts,
mathematicians, operations
researc~ers, and professors)
5-General Management Executives;
(corporate o!l;cers, owners, and
partners)
6-E~gineering Personnel; (systems
.
engineers, research & development engineers)
7-Research Personnel
a-Students
9-Library Subscription
10-Subscription in Company Name
Only

Q.
III

1;;

I
~

\'i

I If
I,

I

~

0>

I~
u
I

::J



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Producer                        : Adobe Acrobat 9.1 Paper Capture Plug-in
Modify Date                     : 2009:03:25 02:41:28-07:00
Create Date                     : 2009:03:25 02:41:28-07:00
Metadata Date                   : 2009:03:25 02:41:28-07:00
Format                          : application/pdf
Document ID                     : uuid:a013c023-71bd-4f45-8b2f-aebc2c060897
Instance ID                     : uuid:67ef6c61-6605-400c-a41b-9d1d8acb8034
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 36
EXIF Metadata provided by EXIF.tools

Navigation menu