197501
197501 197501
User Manual: 197501
Open the PDF directly: View PDF .
Page Count: 36
Download | |
Open PDF In Browser | View PDF |
January, computers Vo l. 24, No . 1 and people formerly Computers and Automation IBM Versus AT&T: Its Meaning To The User and the Public - A. G. W. Biddle The Frictional Interface Between Computers and Society - Robert W. Bemer Languages Among Computers, Machines, Animals, and Men - Lawrence M. Clark The Teaching of Computer SC.ience: Master of Science Degree - J. N. Sn yder Nixon, Ford, and the Political Assassinations in the United States - Richard E. Sprague SNOWFLAKE VIGNETTE by Judy Kin tzinger and Grace C. Hertlein <"\ 01 1 _r" 10\ ·./let::, 'IBRAP ", <:)T THE PURPOSE OF FORUM MULTI-ACCESS FORUM • To give you, our readers, an opportunity to discuss ideas that seem to you important. • To express criticism or comments on what you find published in our magazine . • To help computer people and other people discuss significant problems related to computers, data processing, and their applications and implications, including information engineering, professional behavior, and the pursuit of truth in input, output, and processing. Your participation is cordially invited. "MAY I HAVE YOUR CREDIT CARD NUMBER, PLEASE?" COMPUTER ART EXPOSITION ISSUES FOR 12 YEARS Ed Burnett Ed Burnett Consultant 176 Madison A venue New York, NY 10016 Irene Angelico Centre for Interdisciplinary Studies Concordia Univ. 2010 Mackay Montreal, P.O., Canada In "The Evolution of Telephone Connecting" by William J. McLoughlin, Jr., published in the September 1974 issue of "Computers and People", on page 18, in the last sentence appears: One wonders how long it will be before voice controlled computers will be saying "May I have your credit card number, please? Editorial Note: Reprints are not available but back copies are, and they may be ordered from us. As it happens this is already in force in Canada where the computer is asking for data which can be checked against the file, such as the address of the individual or the telephone number of the individual, and if this number coincides, an order can then be placed. If there is any fumbling, the computer has also been trained to say, "Just a mi nute. I'll have one of those fabulous computers known as a human clerk get in touch with you." This is now being done by Sears and others up in Canada. COMPUTER ART REPORT Both the computer art on the front cover "Snowflake Vignette" and the computer art on page 3 "Apple Blossom Vignette" were made in the same way and produced in two stages. The first stage was carried out by Judy Kintzinger, a student in a computer art course in the summer school of the University of Iowa, Iowa City. In the first stage a design like a leaf or an arrow or a flower was produced by computer program, and then repeated in a rotated pattern; then the entire design, as a larger module, was again repeated in rotation and recorded on microfilm. The second stage was carried out by Grace C. Hertlein, art editor of "Computers and People," and instructor in Judy Kintzinger's course. In the second stage, the design was enlarged photographically and manipulated in various ways to produce several partially overlapping prints with different degrees of lightness and darkness. BOX NO. vs. P.O. BOX NO. Rush Harp Yankee Town Pond Road Box 69 Bearsville, NY 12409 I am a consistent admirer of your philosophy and magazine. However, your "Garbage In, Garbage Out" and "Computers Don't Make Mistakes" views lead me to mention a glaring error which is consistent with human beings: Your magazine is addressed wrong to me: Box 69," instead of "Box 69". "P.O. Most box numbers are in a post office, for people who live and work in cities. However, not so, out here in the boondocks. P.O. Box 69 is another party than I am. Box 69 Yankee Town Pond Road is my own pet number. Nowhere or at any time does any of my correspondence say P.O. Box, but it is a consistent insistence of my publishers to include it. I love your magazine and hate to have the copies fall into other hands, due to your error. Keep up the political assassination reporting. am attempting to spread the word. I Editorial Note: Rush Harp's copies are now addressed "Box 69" and not "P.O. Box 69". We regret the error. P.S.: Computers OFTEN make errorsl -- E.C.B. 2 I am giving a course on the relationship of art and science in the twentieth century, and will devote some time to computer art. If you would send me reprints of the 12 annual computer art expositions (or issues if reprints are not available) ... I would be most grateful. SECOND INTERNATIONAL CONFERENCE ON COMPUTERS AND THE HUMANITIES - CALL FOR PAPERS AND ART This conference will be held on April 3-6, 1974, at the Univ. of Southern Calif., Los Angeles, CA. Papers are invited relating to computer applications in the humanities (language, literature, music, history, archeology, culture, etc.) and in the areas of art and education. Abstracts should be sent to: ICCH/2, c/o Robert Dilligan, English Dept., USC, Los Angeles, CA 90007. Creative artists in any field of art are invited to send descriptions, slides, and abstracts to Assoc. Prof. Grace C. Hertlein, Computer Science Dept., Calif. State Univ.-Chico, Chico, CA 95926. To register for the conference, write to ICCH/2, Founders Hall 407, USC, Los Angeles, CA 90007. COMPUTERS and PEOPLE for January, 1975 IA APPLE BLOSSOM VIGNETTE COMPUTERS and PEOPLE for January, 1975 by Judy Kintzinger and Grace C. Hertlein 3 Vol. 24, No. 1 January, 1975 Editor and Publisher Edmund C. Berkeley Assistant Editors Barbara L. Chaffee Linda Ladd Lovett Neil D. Macdonald Art Editor Grace C. Hertlein Software Editor Stewart B. Nelson Contributing Editors George N. Arnovick John Bennett Moses M. Berlin Andrew D. Booth John W. Carr III Ted Schoeters Richard E. Sprague London Thomas Land Correspondent Advisory Committee Ed Burnett James J. Cryan Bernard Quint Editorial Offices Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 617-332-5453 Advertising Contact The Publisher Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 617-332-5453 "Computers and People," formerly "Computers and Automation," is published monthly, 12 issues per year, at 815 Washington St., Newtonville, MA 02160, by Berkeley Enterprises, I nco Printed in U.S.A. Second Class Postage paid at Boston, MA, and additional mailing points. Subscription rates: Un ited States, $11.50 for one year, $22.00 for two years. Canada: add $1 a year; Mexico, add $6 a year. Elsewhere: one year, Swiss francs 60; order through Reliable Information Publishing Company, P.O. Box 52, 6354 Vitznau, Switzerland. NOTE: The above rates do not include our publication "The Computer Directory and Buyers' Guide". If you elect to receive "The Computer Directory and Buyers' Guide," please add $12.00 per year to you,r subscription rate in U.S. and Canada, and $15.00 in Mex ico; elsewhere, the price of the Directory is Swiss francs 90, not including postage and handling; please order through Reliable I nformation Publishing Company, P.O. Box 52, 6354 Vitznau, Switzerland. Please address mall to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160, or to Berkeley Enterprises, I nc., c/o Reliable I nformation Publishing Co., P.O. Box 52, 6354 Vitznau, Switzerland. Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160. © Copyright 1975, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint), and allow three weeks for the change to be made. 4 computers and people formerly Computers and Automation The Computer Industry 20 IBM Versus AT&T: Its Meaning To the User and the Public [A] by A. G. W. Biddle, Encino, Calif. A discussion of the costly implications for the computer industry and for users, of giant monopoly in communication and computing. 2 "May I Have Your Credit Card Number, Please?" by Ed Burnett, Ed Burnett Consultant, New York, N.Y. [F] Computers and SOciety 14 The Frictional Interface Between Computers and Society [A] by Dr. Robert W. Berner, Honeywell Information Systems, Phoenix, Ariz. How computers and society intermesh, sometimes with grinding of the gears. Computers, Language, Thought, and Communication 7 Languages Among Computers, Machines, Animals, and Men by Lawrence M. Clark, Framingham Centre, Mass. What is common and what is different among many kinds of communication systems that convey information and ideas? [A] 6 "Can A Computer Be Creative?" by Edmund C. Berkeley, Editor An argument that both computers and human beings very often have lOW-level creativity, and very rarely have high-level creativity. [E] Computers, Art, and the Humanities 2 Second International Conference on Computers and the Humanities - Call for Papers and Art [F] 2 Computer Art Exposition Issues for 12 Years [F] by Irene Angelico, Centre for Interdisciplinary Studies, Concordia Univ., Montreal, Canada The issues of Computers and People, formerly Computers and Automation, which contain computer art. 1 Snowflake Vignette by Judy Kintzinger and Grace C. Hertlein [P] 3 Apple Blossom Vignette by Judy Kintzinger and Grace C. Hertlein [P] 2 Computer Art Report An explanation of the construction of the two vignettes. [F] The Computer Directory and Buyers' Guide, 1974 26 Notice COMPUTERS and PEOPLE for January, 1975 0. The magazine of the design, applications, and implications of information processing systems - and the pursuit of truth in input, output, and processing, for the benefit of people. 25 The Teaching of Computer Science: Master of Science Degree [A] by J. N. Snyder, Univ. of Illinois at Urbana-Champaign, Urbana, III. How one university is organizing a curriculum for awarding a joint degree in computers and education Applications of Computers The Profession of Information Engineer and the Pursuit of Truth 27 Nixon, Ford, and the Political Assassinations in the United States by Richard E. Sprague, Hartsdale, N.Y. Presenting "a reasonable hypothesis" for Gerald Ford's pardon of Richard Nixon, and other extraord inary events correlated with that. [A] 19 Unsettling, Disturbing, Critical Statement of policy by Computers and People [F] 32 Games and Puzzles for Nimble Minds - and Computers [C] by Neil Macdonald, Assistant Editor ALGORITHMO - Going from given input to given output in an "unusual" situation. GIZZMO - Some computational Jabberwocky. MAXIMDIJ - Guessing a maxim expressed in digits. NA YMAND IJ - A systematic pattern among randomness? NUMBLES - Deciphering unknown digits from arithmetical relations. SIXWORDO - Paraphrasing a passage into sentences of not more than six words each. Corrections 36 26 Notice Entry form COMPUTERS and PEOPLE for January, 1975 G'0J>80& @ r;:[) R- G~~ -* ~ \? Q., \) & 0 II lb <::J * *(k \) iG. It is planned that the annual index for the 13 issues of Computers and People (including The Computer Directory and Buyers' Guide, 1974) will be published early in 1975. If any subscriber needs an annual index urgently, before it is published, please write to Index Ed itor, Computers and People. E .r-J E '( l "" E !.. ? E Computers, Puzzles, and Games Who's Who in Computers and Data Processing 6th Cumulative Edition, planned for 1975 .J 11-* ANNUAL INDEX FOR 1974 34 Computing and Data Processing Newsletter [C] Cambridge, Mass., Uses Computer To Foil School Vandals Braille Computer Terminal Developed in Australia Three Communities in Massachusetts Make Savings with Computerized School-Bus Routes Many Radio Music Stations Are Run by Computer 2 Box No. vs. P.O. Box No. by Rush Harp, Bearsville, N.Y. A human error corrected for computer output. \jQQ~~ '0~*r.1Q Computers and Education ~- Q)~~ • Q' ri)fY) ,...... '1 ev e~ E'l. Key [A] [C] [E] [F] t6) [F] [P] Article Monthly Column Editorial Forum Picture NOTICE *0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY. 5 EDITORIAL HCAN A COMPUTER BE CREATIVE?" In a recent discussion a friend of mine conceded that a suitably programmed computer could be intelli~ gent and a good solver of problems and a very good chess player, and more besides. But then he said: I subscribe to a denotation of thought as including the activity which we generally refer to as creativity, and this is a function which is currently denied to computers. They can do no more than they have been told to do, and obedience is not creativity. It is in the creative realm that man, the living agent, is inimitable -- thus far. I looked up defini tions of "create" and "creati v- I ty": create: to bring into existence; to bring about a course of action; to produce through imaginative skill; to design, invent, devi se; creative: productive; innovative; formative; constructive; generative; having the quality of something created rather than imitated. Then I read again parts of a famous essay "Mathematical Creation" by the great mathematician, Henri Poincare (1854-1912). In one place he says: What is mathematical creation? It does not consist in making new combinations with mathematical entities already known. Anyone could do that, but tha combinations would be infinite in number and most of them absolutely without interest. To create consists precisely in not making useless combinations and in making those which are useful and which are only a small minority. Invention is discernment, choice. A modern computer (which Poincare never knew about) ,can examine a million possible combinations in less time than a human being can examine a few hundred. Also, it can choose among the combinations, i;e., exercise discernment, according to stated reqUirements,at least a thousand times faster than a human being can. So the argument, it seems to me, reduces to recognizing that there are really two kinds of creativity: One kind we can call high-level creativity. This is the kind that probably my friend and Poincare are referring to. This is the kind displayed by an artist who uses oil colors to paint a portrait as good as Leonardo da Vinci's "Mona Lisa"; or a musician's use of a sequence of musical notes to compose a sym6 phony as good as Beethoven's 5th Symphony. Nearly all human beings and nearly all computer programs are unable to display high-level creativity. But some do. One instance of a computer program that displays high-level creativity is the checkersplaying program of Dr. A. L. Samuels of Stanford Univ. This program analyzes checkers situations in depth, and in addition learns from experience, and so this program has become a checkers champion; it plays checkers far better than Dr. Samuels, its auththor. This program is not "obedient" about checkers; it "knows" far more than Dr. Samuels does about checkers; it makes decisions for itself; and it revises and improves those decisions in the light of experience. Second, there is ordinary creativity. Suppose a kindergarten teacher calls Johnny's pictures "creative". Well, a computer with a random number generator and a graphic output can do just as well producing a collection of paint splashes. Or suppose a road crew shuts off a bridge for repairs and posts signs here and there saying "detour". A computer can do as well or better in locating the signs. A great many people and a great many computer programs can display ordinary creativity. When a human being like Paul Erlich (1854-1915) makes 606 trials for a drug to cure syphilis, and finds that No. 606 works, he is called creative. When a computer makes 23,793 trials and finds that the last one meets best all the requirements, it should be called creative also. So the net conclusion to the argument, it seems to me, is thi s : - ordinary creativity is within the reach of a great many human beings and a great many computer programs; high-level creativity is out of reach for almost all human beings and almost all computer programs; - the proposed criterion "men are creative, computers are not" does not work, is not effective, to distinguish men from computers; - a computer can be creative. ' Edmund C. Berkeley Editor COMPUTERS and PEOPLE for January. 1975 Languages Among Computers, Machines, Animals, and Men Lawrence M. Clark 835 Edmands Road Framingham Centre, Mass. 01701 "We are like fish swimming in an ocean of natural language. We are thoroughly immersed in that ocean, and often blind and ignorant about what lies outside of the part of the ocean that we happen to know." 1. 2. 3. 4. 5. 6. 7. 8. 9. Outline 2. Listening to a Computer Part 1. A Survey of Languages The computer may respond to you with a single final answer, or it may respond to you not only with the answer but also with many intermediate answers and other pieces of information besides. In the case of access to a computer through a time-shared terminal or non-shared console, you can get so much response that you reach rather full and adequate twoway communication. Telling Computers What to Do Listening to Computers The Problem of Wrong Instructions Artificial Languages for Instructing Computers Ordinary Natural Language for Instructing Computers Languages Among Machines That Are Not Computers Languages Among Animals Languages Among Men Essential Features of a Natural Language Part 2. The Designation of Meaning 1. 2. 3. 4. 5. Linguistic Constraints Upon Thinking The Words for "A Group of" The Misleading of Thought by Language The Words for Mathematical Ideas How to Improve the Designation of Meaning The purpose of this article is to report on a number of aspects of language, to discuss some significant problems of designation of meaning, and to indicate some probable future developments in language. Computers make extensive use of language in order to fulfil their functions; to place computer languages in the perspective of languages in general may be helpful. 1- 1. Telling Computers What to Do Anybody who approaches a computer is compelled to pay some attention to the subject of language. For if one intends to have a computer do something useful, then one regularly has to tell it what to do and how to do it; and this requires a system for giving instructi ons. It Now you yourself can avoid telling the computer how to do it -- by hiring a computer programmer, or buying a software package, or through some equivalent process. But still the person who does the programming or makes the software has to learn a system for instructing the computer, a language. This requirement implies that you (or your substitute) has to learn a system for communicating with it. And a system for communicating is a language. So the subject of languages in general is intimately associated with the use of computers. COMPUTERS and PEOPLE for January. 1975 This is an important additional dimension of language; interaction. The computer says thing-s to you and you say things to the computer. Interaction is far more satisfying to human beings -- most of whom love to talk. To talk to a computer and to have a computer talk back rationally can be thrilling. This experience "turns people on;" it is an experience that helps deprived learners learn. See the references "The Personality of the Interactive Programmed Computer" / 2/ and "Computers in Inner-Ci ty Classrooms"/5/. The responses of a computer can be of several styles. The least useful style happens when the computer types just a questionmark when it has not understood something as an instruction. Then you wonder what you might have said to the computer that it could not accept; and having come to some conclusion, you try a new command on the computer, to see if that works. A much better response from the computer happens when the computer types "Error 21," say, and then you look up error 21 in a numerical list of errors, find it, read the description, realize what you did that was wrong, and act differently. A still better system happens when the computer queries you, specifying different possibilities you might have intended, and asks you -- then you are able to choose among the possibilities, give the computer a correct instruction, and proceed. 3. The Problem of Wrong Instructions Every now and then you find out that a computer has done exactly what you told it to do, but not what you wanted it to do. If you had been talking to a clerk about a calculation, the clerk would have known from his prior experience that you could not have intended something that you said; and so applying his experience or general knowledge or common sense, he would have changed what you said to what you meant. Many rather famous 7 stories are told about how a computer did just what it was told to do but not what the programmer intended. One such story is of the Mariner space probe that was to fly by Mars and photograph it; but it missed Mars by a great distance because somewhere in the long series of instructions controlling it a hyphen had been typed instead of a space. To guard against errors of language, logic, or human mistake-making, etc., many common sense procedures have evolved. For example in a system using interactive business programs, when a clerk is using a video data terminal to enter orders, on the screen may appear something like: Do you want to make any changes in this order? (YIN). Then the clerk looks over the figures, compares them with the incoming purchase'order, and if he sees nothing wrong, he types N. Then the screen once more responds: Last call: are you really sure all the figures here are right? (YIN). Then presumably the clerk compares once more, and if it still appears that all is correct, this time he has to type Y. At that point and only then, the system accepts the data and enters the incoming order. 4. Artificial Languages for Instructing Computers The need to instruct computers, to tell them what to do and how to do it, has been responsible for the development of a large number of artificial languages, probably more than 2000 in all. At the beginning of computers, for example in 1944 at the Harvard Computation Laboratory with the Harvard IBM Automatic Sequence Controlled Calculator Mark I, it was necessary to write instructions in fine detail. These were sequences of 24 ones and zeroes in bottom-level "machine language." These sequences of ones and zeroes controlled 24 corresponding switches at the tape reading station. As each instruction was read on 24 hole paper tape into the computer, the machine connected two locations A and B tb the bus and performed operation C; each of A, Band C used eight one's and zeroes. Then special purpose languages came into use, many of them expressed in "symbolic assembly language." This would "assemble" a program on a specific computer, and would allow the programmer to designate locations where particular data was stored by using its symbolic address rather than its actual address. Then "general purpose" languages were developed, such as FORTRAN (which was the first), BASIC, COBOL, PLII, APL and a number of others, and probably over 300 more. These freed the programmer from the need to specify particular locations for the storage of each piece of information. These languages theoretically and often in practice could be used without change from one computer to another. Some general purpose languages were developed to apply to restricted classes of problems, such as: AED, for Automated Engineering Design; SIMSCRIPT II, for large problems in discrete simulation; COURSEWRITER, for computer-assisted instruction in any field of knowledge; etc. The languages for expressing algorithms (calculating rules and procedures) and the general purpose languages for instructing computers have interwoven with each other. 8 5. Ordinary Natural Language for Instructing Computers For more than 25 years it has been widely believed and maintained that only rigorous, precise, exact language could be used for talking to computers and that human beings therefore had to become inhumanly exact and inhumanly logical in order to program computers. This is not true. About 1972 Warren Teitelman, then of Bolt Beranek and Newman, Cambridge, Mass., developed a syst~'m DWIM which was a "front end" for using the general purpose programming language called LISP. LISP is hard to use because it is unusually fussy in insisting on properly matched pairs of parentheses (mathematical parentheses placed around expressions). He wrote a report "Do What I Mean: The Programmer's Assistant." He described a number of techniques incorporated in the front end which would "forgive" a human programmer for his mistakes. It would either automatically correct rather transparent mistakes, or query in regard to a suggested interpretation. In this way DWIM would remove much of the labor from the programmer, enable him to concentrate his attention on higher level issues, and become markedly more efficient in his use of LISP. See Reference 14. Work in understanding ordinary natural language is going on at a number of laboratories including Mass. Inst. of Technology, IBM Corp., Stanford University, Xerox Corp., and elsewhere. A series of articles on "Computer Programming Using Natural Language" has been published in this magazi ne. See Reference / 3 / • The evi dence offered in these articles demonstrates that a computer program can take in a great variety of non-rigorous instructions (that are unambiguous), and produce rigorous instructions from them. Some of the work in being exact in programming is being transferred from human program writing into human questionnaire answering, which is easier. IBM Corp. has a programming language called RPG II (Report Program Generator Model 2). In this language a good deal of the. information for programming a computer to cover a particular business application consists of answers to a series of questions, yes or no. After all the questions have been answered, the series of yeses and noes are put into the computer system that makes programs (an RPG II compiler). That goes to work and produces the tailormade program that covers the needs of the particular busin~ss application. So much for the present discussion of the state of computer languages. Let us turn now to considering languages in other areas. 6. Languages Among Machines that Are Not Computers Many machines that are never thought of as computers also require a system for communicating between the machine and a human being, and between the machine and the environment. An ordinary motor car driven by an ordinary human being is such a machine. It contains many pieces of apparatus (odometer, speedometer, fuel gauge, oil pressure indicator, etc.) for communicating information to the driver, and for receiving instructions from the driver (steering wheel, gear shift handle, brake pedal, etc.) Some machines act in complex ways quite indepen~ dently of any human operators. Such machines detect information (through sensors) and perform actions that work on the environment (through acting elements COMPUTERS and PEOPLE for January. 1975 like valves, rods, bells, etc.). They all contain somewhere a black box (or more than one black box) where the incoming signals from sensors are appropriately associated with the outgoing signals to acting elements. Such machines are often called servomechanisms or automata or robots. A very simple example of a robot is the heating system in an ordinary building -- with its thermostats, pilot flame, valves, relays, etc. A very complex example of a robot is the dial telephone system of North America. That may well be the largest and most complex robot ever made. The languages spoken inside this robot are sets of ones and zeroes for some purposes, sets of tones (as in the touchtone telephone) for other purposes, and probably more. Ordinarily in these languages there will be just one word or expression to express each idea or meaning in the same way as in mathematics, where the expression 2 is always used for the idea two. But when the dial telephone system starts talking to a human user, it will translate into one of the ordinary natural languages, and utter sounds. For example, nowadays when I dial a telephone number that has been changed, the system (doubtless a computer connected to a recording of a voice) tells me the digits of the new number, and a little later in the recorded message it repeats those digits once more. 7. Languages Among Animals o Many kinds of insects, birds, and animals have an important degree of language. One interesting source of information is the book "King Solomon's Ring" by the Austrian naturalist Konrad Lorentz. See reference/lO~ A colony of jackdaws that nested on and near his house were able to do a fair amount of communicating on a number of subjects. Repeatedly one of the jackdaws, who was lonely, in her song seemed to carryon a soliloquy about "good old times," until finally one day her mate, a jackdaw who had been lost for a long time from the colony, returned from migration, and resumed his relationship with the colony and with her. Ants succeed in conveying information to each other. The language appears to consist of different chemicals and smells that convey signals; probably also the motions of ant antennae convey signals. The number of possible choices of information to be conveyed is probably rather small, perhaps no more than several dozen. One August I observed an anthill which was eleven feet across, located near Nyack, N.Y. This anthill maintained herds of aphids on scores of leaves of bushes a hundred feet distant. The herds of aphids were tended by the ants. There were well traveled trails in the deep grass between the aphid farms and the anthill. Such organization implies a system of communicating information; and any such system is a language. Bees undeniably have a language that conveys ideas. Some excellent studies by the Austrian investigator Karl Von Fritsch, have shown that bees convey to other bees the distance and the direction from the hive of especially attractive food. He began his experiments by setting out a dish of scented sugar water at a certain distance and direction from a bee hive. For two or three days no hees found the dish. Then a few bees did find the dish: he marked them with paint. Soon a great many more bees not marked with paint came to the dish of sugar water. He varied the location of the dish, and observed the behavior of the painted bees within the hive. The hive COMPUTERS and PEOPLE for January, 1975 had been made with a glass side: he could watch with red light invisible to the bees. The scout bees returning to their hive seemed excited: they carried out an elaborate "dance," which other bees detected with their antennae. The dance was either a round dance, or else a wagging dance: the number of rounds and the number of waggings in an interval of time indicated the relative distance of the sugar water. The direction of the sugar water was indicated by the direction of the dance of the scout bees, in this way: if the hive was horizontal, the direction of the scout bee's forward motion in the dance was the same as the direction of the food: if the hive was vertical, then the direction of the dance of the scout bee was at an angle from the vertical which was the same as the angle of the direction of the food from the direction of the sun. According to investigators, birds have learned languages up to several hundred words: most of this learning is parroting, utterance without attention to meaning. The method of teaching a bird any words is affectionate and loving rearing of the bird in the way that a mother brings up her young. Occasionally, however, the bird will use words with their proper meanings, like saying "Don't go away" to the investigator. Monkeys that live in families in the tropics apparently use a language consisting of maybe six to a dozen signals. Wolves that live in families and packs have a degree of language by which they give and receive information. See the book "Never Cry Wolf" by Farley Mowat. /12/ Chimpanzees in captivity, according to some investigators, have about twenty words or signals. A story is told that one scientist having learned some chimpanzee language at the Yerkes laboratory made himself welcome at once among a group of chimpanzees in the London zoo by talking to them in chimpanzee language. Chimpanzees also show evidence of being able to deal with nonverbal symbols. At the Yerkes Regional Primate Research Center, Athens, Ga., a chimpanzee named Lana has been "talking" with the aid of a computer and a new language called Yerkish created especially for her. She can make grammatically correct requests for food and entertainmerit by punching out sentences on a special vertical keyboard: and she can "read" in her language. See the report "Communication -- Three-Way: Chimpanzee, Man, Computer," Reference/ 7/. 8. Languages Among Man Of all the tools of human beings, language, equipment for communicating, is probably the most ancient and the most indispensable. In order for the members of a species to work together in complicated ways, language is necessary. In order for the young of the species to be trained, not only by examples and sensations, but also by ideas and commands, language is necessary. With language the adults teaching the young do not have to find and illustrate all the situations for instruction: some of the situations can be dealt with by words alone. Finally, the separate items of language can be used as markers, as counters, for the process of reasoning and thinking. What is language? Basically, language is equipment for referring to and handling all the ideas, situations, and experiences that a society is interested in. Language deals with the experiences and situations that occur in the culture of that society. 9 What kind of equipment? In the case of nearly all human languages, the equipment basically consists of sounds that human beings can-utter and hear, and to which meanings have been attached by convention. The convention is an unspoken general agreement among the members of the society which is learned thoroughly as the young people grow up in the society. The purposes of human language are: communicating, that is, conveying ideas, asking questions and getting answers; reasoning; describing strange ideas in terms of familiar ones; expressing emotions and feelings; expressing politeness and ceremony. Language contributes so very much to the thinking of human beings that we are seldom aware of all that it does do. Beginning with our earliest years, language teaches us, educates uS,focuses our attention, and commands us to deal with the ideas that language alludes to. Language provides hooks for hanging our ideas on, boxes for putting them in, and trays for moving them around. Language is a mirror of the thoughts we have, and it reflects them quite faithfully and impartially -- both wh~n we are right and wh,n we are mistaken. The languages actually spoken by the groups of human beings allover this world have been studied to a considerable extent. An inventory of them as of about 1950 is as shown in Table 1. Table 1 . Approximate No. of Languages Spoken Europe and Asia Africa North America South America Total 720 530 240 ~ 1730 Among these languages there is a tremendous variety. Many of them make neat and felicitous distinctions which are absent in English; many of them ignore distinctions which are present in English. 9. Essential Features of a Natural Language ~mid all these variations, what is essential in a language? Everyone of the known languages is made up of sounds. The most convenient equipment for symbolizing ideas has always been the sounds that human beings could utter and hear. Other languages such as writing are secondary. The sounds that occur in languages have been inventoried and studied. There are perhaps some 60 sounds and some 60 styles of modifying them, making mathematically 3600 combinations. These elements are technically called phones, and the study of them phonetics. In anyone language, a cluster of phones may be treated by the speakers of that language as having the same significance. In English for example, a cluster of different ways for letting air explode through the lips is designated as "b" and another cluster of similar sounds is designated as "p", and they are distinguished by speakers of English; in Dutch this difference is not observed, "p" and "b" are not distinguished. In any language each cluster of sounds selected by the language as significant is called a phoneme, 10 and the study of them is called phonemics. do not have meanings in themselves. Phonemes Every language can be organized into phonemes. The number of phonemes present in a language ranges from 17 in Tagalog, a language of the Philippines, to 45 in Navaho, an American Indian language of Arizona. There are about 40 phonemes in English, about 17 of vowel type, and 23 of consonant type. In every language phonemes are arranged and assembled into words and word elements. Words and word elements are technically called morphemes, units of form; morphemes are those arrangements of phonemes which have meaning in the language. Every language consists of a large set of words (morphemes). A collection of all the words (morphemes) in a language is a dictionary. A collection of all the meanings represented among the words in a language is a lexicon. Every known Inaguage has at least 5,000 words, and English, the largest language, contains over 500,000 words. Every language recognizes single complete linguistic utterances -- which are often called sentences, although that term is not inclusive enough. Every language has rules for assembling words and word elements into utterances. These rules are called grammar and syntax. Every known language has intricate grammer; some languages have grammar much more intricate than others. English has lost most of the old grammar that it used to have. This was a fortunate result of social conditions in the 300 years following the Norman conquest of England in 1066. Every language has the power to express a large part of any situation occurring within the social cuI ture in which, it belongs. In addi tion it has the power to create new expressions. Thus as the culture of a society develops and changes, and new ideas need to be referred to, these new ideas also may be expressed. Every language summarizes experiences that are not the same but are much alike into single words 'or expressions that are, to the extent of the summarizing, vague. For example, nearly every language has a word for "the sun"; and all the different manifestations of the sun at dawn, at noonday, at sunset, in clouds, or in clear sky are summarized and lumped together under one word, the word for "sun." But in at least one American Indian language, that word also refers to "moon"; the word in fact means "large shining heavenly object," and speakers rely on the context to show which one of the two they mean. Every language has devices for classifying situations and experiences so that they can be described using a finite number of expressions. The devices for classifying situations and experiences vary greatly from language to language. Some of the classifications are obligatory and some are optional. It is reasonable to believe that the language that has the fewest obligatory classifications is the best. English has at least six obligatory classifications: they include number, gender, case, tense, and some other particulars. Latin has more. For example; in Latin you cannot say "Who did it?" without specifying the gender of "who" and' the number of "who." So there are four ways of saying this, and the speaker must decide which one to say. Even in English we may be reCOMPUTERS and PEOPLE for January, 1975 \ -;4 quired to specify "animate or inanimate." We run into the problem when we have to say "who or what made this letter?" In Chinese, one does not have to specify singular or plural unless one desires to. In Chinese, the word for "horse" means "horse" or "horses"; optional words tell the listener whether the speaker refers to one or more horses. Chinese in this respect is certainly better than English. Classifications that make no difference in the social culture of the people speaking the langu~ge will not be found. Classifications that are important in their culture will be fully worked out. For example, in Latin there were two words for "uncle"; these were "atruus" or "avunculus" depending on whetherthe uncle was the father's brother or the mother's brother. But in English this distinction is almost never thought of, much less registered in separate words, because in our culture it is very unimportant whether an uncle is via the mother or the father. The devices used for expressing grammar vary from language to language. Some languages use order almost to the exclusion of other devices. Some use suffixes or prefixes that tell which terms belong together, the principle of concord. For example, Edward Sapir, a former professor of languages at Yale, gives an example from the Bantu language of Africa. He says: In such a sentence as "that fierce lion who . came here is dead," the class of "lion," which we may call the animal class, would be referred to by concording prefixes no less than six times: in "that," in "fierce," in "lion," in "who," in "came" and in "dead." Distinctions which are considered obligatory in one language may be almost missing from another. For example, the distinction as to "definite" or "indefini te" which in Engli sh we must always express by "the" or "a" or in some other equivalent way is missing from Latin~ although Latin does have demonstratives. And of course in the English of newspaper headlines, this distinction also disappears as in "man bi tes dog" -- wri ter and reader alike take it as part of the context, to be reasoned out only if important. Distinction as to parts of speech varies greatly from one language to another. Most languages however have noun-like and verb-like forms. Some languages push adjectives into verbs, others push them into nouns. We have no single verb for "is red," although we do have a single verb that means "becomes red," namely "reddens." In some languages all adj ecti ves are verbs in this fashion. Franz Boas, a great anthropologist, said that some principles of grammar are the same allover the world. He says: The relational functions of grammar have certain principles in common allover the world. Here belong for instance the relations between subject and predicate, noun and attribute, verb and adverb, and the relation of the experience to the speaker (the self) and to others -- that is, the relation expressed by the pronouns I, you, and he. The methods by means of which these and other relations are expressed vary very much, but they are necessary elements of every grammar. COMPUTERS and PEOPLE for January. 1975 Part 2. The Designation of Meaning 1. Linguistic Constraints Upon Thinking In spite of the enormous richness of developed modern languages, of which English is perhaps the best example, natural language constrains, bends, distorts, that which we may want to say. Sometimes we cannot say what we want to say without inventing new words and new forms of expression. The English language actually adds about 1000 to 3000 new words, new uses of old words, and new expressions to the language in every calendar year. A fine report on these words introduced since 1963 is in the book by Clarence Barnhart. See reference/ 1 /. Edward Sapir (1884-1939), an American anthropologist, and a professor at Yale University, linguist, and author, once wrote as follows, regarding the important influence of language on human beings: Human beings do not live in the objective world alone, nor alone in the world of social activity as ordinarily understood, but are very much at the mercy of the particular lan~ guage which has become the medium of expression for their society. It is quite an illusion to imagine that one adjusts to reality essentially without the use of language and that language is merely an incidental means of solving specific problems of communication or reflection. The fact of the matter is that the "real world" is to a large extent unconsciously built up on the language habits of the group •..• We see and hear and otherwise experience very largely as we do because the language habits of our community predispose certain choices of interpretation. In a basic sense, human beings deeply need more adaptable, less conventional patterns in their minds, so as to think better. We need to escape limitations from culture, history, language, propaganda, etc. Consider George Orwell's remark in "1984" (published by Harcourt Brace, New Xork, many editions): The purpose of Newspeak was not only to provide a medium of expression for the worldview and mental habits proper to the devotees of Ingsoc, but to make all other modes of thought impossible. 2. The Words for "A Group of" Let us take a specific example of linguistic constraint. Suppose we read a short report, first in one style, then in a second style: One afternoon in August, John Jones drove away from New York in his car, surrounded by a mob of other cars. Flying overhead was a drove of airplanes. Soon he overtook a travelling circus, passing a swarm of elephants, a flock of dogs, and a bevy of trucks. As the sun set, he saw in the west a herd of rosy red clouds. In the second style, here is the same report: One afternoon in August, John Jones drove away from New York in his car, surrounded by a group of other cars. Flying overhead was a group of airplanes. Soon he overtook a travelling circus, passing a group of elephants, a group of dogs, and a group of trucks. As the sun set, 11 he saw in the west a group of rosy red clouds. In this example, we see what happens when we deliberately scramble the customs of English in using words that mean "a group of," words like "mob, drove, swarm, flock, bevy, herd." English contains forty or fifty such words with different connotations. For example, "swarm" implies "a group of bees or insects" and "herd" implies "a group of large animals." Of course, there is almost no logical sense in varying the word meaning "a group of" depending on the kind of thing being grouped. But as long as writers want to write "good usage" and prefer to obey present happenstance usage in regard to words like these, so long will the expression of logical ideas be clouded, and thinking be constrained, bent, by the language of "good usage." 3. The Misleading of Thought by Language Benjamin Lee Whorf (1897-1941), a graduate of Mass. Inst. of Technology, worked as an engineer in a fire insurance company in Hartford, Conn.; but a great deal of his avocational research and thinking was in the field of language and linguistics. The following passage is taken (with minor changes) from his article "The Relation of Habitual Thought and Behavior to Language" included in "Language, Culture, and Personality: Essays in Memory of Edward Sapir," edited by Leslie Spier, published by the Sapir Memorial Publication Fund, Menasha, Wisconsin, 1941 : ((Beginning of Quotation)) An accepted pattern of using words is often prior to certain lines of thinking and forms of behavior. A man who assents to this statement often sees in such a statement nothing more than a platitudinous recognition of the hypnotic power of philosophical and learned terminology on the one hand, or of catchwords, slogans, and rallying cries on the other. To see only thus far is to miss the point of one of the important interconnections which Sapir saw between language, culture, and psychology. It is not so much in these special uses of language as in its constant ways of arranging data and its most ordinary everyday analysis of phenomena that we need to recognize the influence it has on other activities, cultural and personal. In the course of my professional work for a fire insurance company, I undertook the task of analyzing many hundreds of reports of circumstances surrounding the start of fires, and in some cases, of explosions. My analysis was directed toward purely physical conditions, such as defective wiring, presence or lack of air spaces between metal flues and woodwork, etc., and the results were presented in these terms. Indeed it was undertaken with no thought that any other significances would or could be revealed. In due course it became evident that not only a physical situation as physics, but the meaning of that situation to people, was sometimes a factor, through the behavior of the people, in the start of the fire. And this factor of meaning was clearest when it was a LINGUISTIC MEANING, residing in the name or the linguistic description commonly applied to the situation. a. Empty Gasoline Drums. Thus, around a storage of what are called "gasoline drums," behavior will tend to a certain type, that is, great care will be exercised; while around a storage of what are called "empty gasoline drums," it wi 11 tend to be different 12 -- careless, with little repression of smoking or of tossing cigarette stubs about. Yet the "empty" drums are perhaps the more dangerous, since they contain explosive vapor. Physically, the situation is hazardous; but the linguistic analysis according to regular analogy must employ the word "empty," which inevitably suggests lack of hazard. The word "empty" is used in two linguistic patterns: (1) as a virtual synonym for "null and void, negative, inert," (2) applied to analysis of physical situations without regard to, e.g., vapor, liquid vestiges, or stray rubbish, in the container. The situation is named in one pattern (2) and the name is then "acted out" or "lived up to" in another (1), thi s being a general formula for the linguistic conditioning of behavior into hazardous forms. b. Limestone. In a wood distillation plant the metal stills were insulated with a covering prepared from limestone and called at the plant "spun limestone." After a period of use, the fire below one of the stills spread to the "limestone," which to everyone's great surprise burned vigorously. Exposure to acetic acid fumes from the stills had converted part of the limestone (calcium carbonate) to calcium acetate. This when heated in a fire decomposes, forming inflammable acetone. Behavior that tolerated fire close to the covering was induced by use of the name "limestone," which because it ends in "-stone" implies noncombustibi Ii ty. c. Pool of Water. A tannery discharged waste water containing animal matter into an outdoor settling basin partly open. This situation is one that ordinarily would be verbalized as "pool of water." A workman had occasion to light a blowtorch nearby, and threw his match into the water. But the decomposing waste matter was evolving gas under the wood cover, so that the setup was the reverse. of "watery". An instant flare of flame ignited the woodwork, and the fire quickly spread into the adjoining building. Such examples, which could be greatly multiplied, will suffice to show how the cue to a certain line of behavior is often given by the analogies of the linguistic formula in which the situation is spoken of, and by which to some degree it is analyzed, classified, and allotted its place in that world which is "to a large extent unconsciously built up on the language habits of the group." And we always assume that the linguistic analysis made by our group reflects reality better than it does. ((End of Quotation)) 4. The Words for Mathematical Ideas One of the clearest examples of the need to break away from the restraints of ordinary natural language is the development of mathematical words for mathematical ideas. The special linguistic ways in which mathematicians talk about mathematics have developed for more than 2000 years. For example, the formula A =1rr2 is the mathematical form for the English statement The area of a circle is equal to 3.1416 ••• times the square of the radius of the circle. A formula which has had a name for more than 2000 years is the Pythagorean Theorem: h2 = a2 + b2 In English this is: The area of the square constructed on the hypotenuse of a right-angled triangle is equal to the sum of the areas of the squares constructed on the base and on the altitude. COMPUTE RS and PEOPLE for January. 1975 These are examples of the brevity and perspicuity of mathematical language, which is a forerunner of much of the language used for describing algorithms to be used on computers. Mathematics is very largely a language that has three special properties. First, its chief subject matter is certain kinds of abstract elements -- numbers, lines, points, etc. -- and the relations of these elements. Second, its chief property is that it makes use of very efficient symbols, symbols that one can calculate with to a vast extent. Third, its chief purpose is to determine necessary consequences from given assumptions. All these properties are of course present to some extent in ordinary language. In ordinary language, you can talk to some extent about numbers, lines, points, etc., and their relations. In ordinary language, you can even calculate to some extent. And, using ordinary language, you are often interested in deducing the necessary consequences of some suppositions. Accordingly the difference between mathematics and ordinary language is partly a difference of quality, but also a difference of degree. It is reasonable to believe that if you have a desirable property in mathematical language, you may be able to arrange the same desirable property in language. We have mentioned calculation. What do we mean by it? We mean that we can manipulate symbols according to rules that pay little attention to meanings, and that when we come out with results at the end of the process of manipulation, then our symbols often apply truthfully to real situations. People can and do calculate with ordinary words, even when they are not sure of the meanings of these words. Here is an example taken from "Language and Communication" by George A. Miller: Suppose we learn on good authority that all mantelops are lespeads and that all lespeads hile. We can conclude immediately that all mantelops hile, and that any grimpet that does not hile certainly is not a mantelop. There may of course be lespeads that aren't mantelops, so hiling is not a sure sign of mantelopicity. Then he says: The fact that we have no idea what we are talking about does not stop us from talking. We simply operate on names and properties according to the rules governing the use of logical terms. And he might very well add, though he did not say so, that the reasoning is perfect, and that all we have to do to get truthful uses of the statements about "mantelops, lespeads, hiling, grimpets" is to interpret the words in suitable ways. 5. How to Improve the Designation of Meaning How shall we improve the designation of meaning? and the description of reality so that we can more faithfully describe it and deal with it? Of course this is an old problem. Many people work on it both consciously and unconsciously from time to time. A person who coins a new and useful expression is helping in this process. In the United States some time in the 1830's the expression "OK" was coined. No authority is quite sure of the derivation. Now the word is internationally used, and COMPUTERS and PEOPLE for January. 1975 everywhere understood and accepted. It filled a need. And it is much clearer than "yes" and "all right. " There is continual competition in language between different expressions for closely related ideas. The competition often produces two words where there was just one before. "Of" and "off" for example are both derived from the same word. Differentiation is the name given to the linguistic process. The movement for the liberation of women has produced the word "Ms." (pronounced "miz") so that a woman can be addressed politely without the designation of whether or not she is married. This is obviously a useful and democratic improvement and probably is permanent. Correspondingly, "spokesman" and "chairman" have sprouted the words "spokesuerson" and "chairperson." Whether these three-syllable words offered in place of two-syllable words will survive is a question; but the words might survive. Perhaps the most important process for improving the designation of meaning is paraphrasing, translating from one set of words, often with highly colored overtones, into words that are much more neutral and avoid those overtones. "Shit" becomes "excrement". "Pigheaded fool" becomes "stubborn and foolish person". "The morgue" of a hospital becomes "Ward X". Paraphrasing -- translating expressions into other expressions that "say the same thing but say it better" -- is a key process. A computer can do paraphrasing. When a program is written in FORTRAN,the computer by means of what is called a FOInRAN compiler can paraphrase that program into a machine language program that will enable that computer to solve that type or problem. The program "DWIM," "Do What I Mean," mentioned above can do paraphrasing. It will accept many variations of computer input from a human being and convert them all into a single standard computer input. This is the early seed of a great development 'in computer applications. We are like fish swimming in an ocean of natural language. We are thoroughly immersed in that ocean, and often blind and ignorant about what lies outside of the part of the ocean that we happen to know. The development of computer paraphrasing of expressions, statements and discourse in ordinary natural language will take us a long way. Like lung fish we shall climb out of the ocean, and begin to obtain a much greater and more correct picture of the world, eventually including land, atmosphere, and space. REFERENCES 1. Barnhart, Clarence L., "The Barnhart Dictionary of New English since 1963", Harper & Row, New York, NY, 1973, '510 pp. 2. Berkeley, Edmund C., "The Personali ty of the Interactive Programmed Computer," in "Computers and Automation," Dec., 1969 3. Berkeley, Edmund C., Andy Langer, and Casper Otten, "Computer Programming Using Natural Language," in "Computers and Automation" or "Computers and People": Part I, Jun, 1973, p.lO; Part 2, Jul, 1973, p.18; Part 3, Aug, 1973, p.28; Part ~, Aug, 1974, p.2; Part 5, Oct, 1974, p.30 (please turn to page 19) 13 The Frictional Interface Between Computers and Society Dr. Robert W. Bemer Honeywell Information Systems Phoenix, AZ USA "We all must cease to make wrong decisions on a large scale because mankind can no longer afford it. Mankind's resources are highly limited, and we can no longer squander them." - V. A. Trapeznikov For purposes of this article I propose a simple and perhaps novel classification of computer applications -- in three classes. A pair of questions indicates a possible dilemma: Q: The Computer Advises A: Applications that do not lead to decisions affecting humans directly -- Examples come largely from the field of numerical computation, the earliest category of usage. Computational results that might tend to prove or lead to a theory; calculations for spaceship or missile design (they don't have to be built or launched); programs for playing games, or associating payoffs with strategies, etc. We may term such computation "advisory." The Computer Proposes Decisions Applications with computational results that lead to decisions by humans -- Some of these can get very close to integration into human affairs. For example, someone may be denied credit or refused an employment opportunity. It has turned out, in much practice, that the human decision to be taken may be perfunctory or mindless. Nevertheless there is recourse, no matter how time-consuming and difficult it may be, and regardless of what body of law may need to be enacted to protect people in such circumstances. The Computer Decides, and if not Countermanded Ac~s (the Robot) Applications where the computer has been previously programmed to take a decision and take an action, and will in fact act unless countermanded in time -- Examples are online patient monitoring, control of nuclear power plants, air traffic control and collision avoidance systems, automatic transportation . systems (i.e., BART, in San Francisco), and automobile braking and antiskid systems. Q: A: Does technology exist to integrate computer components very closely into human affairs? Yes. For an example, see the 1974 US automobiles, which will not operate unless seat belts are fastened. Are system design and good practice manuals available for such a level of technology, and/or is suitable indoctrination and education available in our educational institutions? Emphatically NO! This fact is frightening enough to suggest a moratorium on such developments until we understand the tool better. Inoperable Robots Consider the announcement of an experimental device which requires matching a certain procedure before you can start your automobile. The intent, and certainly an obvious usage, is to preclude drunken drivers from operating vehicles. But suppose that you are extremely shaken because your wife has just been killed, and your child needs to be taken to the hospital. Could you start the car then? Or consider the case of online patient-monitoring reported in Datamation magazine of 1972 October. The programming was correct but the computer was not 100% reliable. This, as we know, is taken care of by having a customer engineer to fix it. But nobody remembered to find out whether the customer engineers would always be available over the weekend, and speedily. As reported, a patient died because confusion in the human system caused the computer to remain inoperable. Space Effort Experience in Overriding Robots Tremendous Increase of Robots The hardware developments of about the last three years leading to microprocessors on chips, portend a tremendous increase in the third class of application. And this is why we must be on guard as to the propriety and systems aspects of such applications. Applied to automobiles, such applications could be extremely critical. One is reminded of power-steering, a boon when it operates, perhaps, but a definite danger when power fails or is turned off. Certainly the US space effort has gathered ample experience in the matter of letting computers decide, when they are capable of it, and of overriding them sensibly when it is shown that they were programmed incorrectly or without consideration for all eventualities and malfunctions. We see many spin-offs from the space effort with respect to products, but very little in methodology which could be so very applicable to computer usage. Based on a presentation to the NordData Conference, Copenhagen, Denmark, August 1973. 14 COMPUTERS and PEOPLE for January, 1975 Computers as a Boon Now, I like computers. I believe that they are presently more beneficial than harmful to society, and that this ratio can be increased if we take careful consideration and plan for their best and proper usage. If I were fatalistic, I should feel that they have arrived just in time to save us from our enemies, who are ourselves. In 25 years as a programmer I have never faced a day of working with computers without pleasant anticipation. I also like a fire in the fireplace, but not arson. Both fire and computers are tools accessible to all of society in some form, and society uses such basic tools in many ways, some deemed good and some bad. Fire was an early tool, useful for hollowing out logs to make vessels, to make transformations in food, and to heat enclosed air. It was also used to burn vegetation and trees, sometimes accidentally (which was thought bad) and sometimes deliberately, to clear for planting (which was thought good). Side-Effects, Unanticipated A major difficulty in analyzing the contribution of a tool is the inability to categorize, in an absolute way, its uses as being good or bad. This is not philosophical, but only to remind us that we make these judgments of good and bad in the narrow context of our mores and morals, which are in turn conditioned by ou~ accumulated knowledge and analysis of the workings of our world. We have learned a little more of those workings lately, not because we sought the knowledge so much as because it has been made painfully evident to us that there is more or less coupling between all the elements of our world. :i, t m o d d I quote from an interview with Dr. Carl Hammer of Univac, regarding a conversation with V. A. Trapeznikov, acting Co-Chairman of the United States and Russian Joint Commission on Scientific and Technical Cooperation: "He told me, as he told President Nixon one day earlier, that 'we all must cease to make wrong decisions on a large scale because mankind can no longer afford it. Mankind's resources are highly limited, and we can no longer squander them' ••• we must develop not only national but international models for improving our decisionmaking processes. Decisions which at this time are made on a political or emotional base, neither way will produce optimal results." So I touch on some bad uses of computers only to illustrate the problems to overcome by legislation, education, and professionalism to make computers serve us better. Mind-Amplifying Factor 1- Carl Hammer says "We have already built into our society a mind-amplifying factor of 2000 to one. Behind every man, woman, and child in this country (the US), there stands the power of 2000 human beings. The responsibility of any data processing manager of today, of the computer scientists ••• is so enormous that even I cannot envision it. It is the greatest challenge that has ever faced mankind." Power it is, in elemental form. IBM's recent advertising stresses "think of the computer as energy." Theoretically, the computer is vast power at the COMPUTERS and PEOPLE for January. 1975 service of people, to be used as the imagination of the people leads it, subject of course to limiting legislation. Knowledge Power But let us not be lulled by any advertising into thinking that the energy is just like electricity. Computer power is work power, but it is also knowledge power, of the kind that has been used throughout history for aggrandisement as well as the good of the people. In a time when technology stands at bay, it will be well to consider the dangers of computer misuse in prejudicing the population against a valuable tool, and of misuse by corrupt or ignorant officials. There are no known instances of computers voluntarily stopping normal work to perform illegal acts without direction by humans. Consider the science fiction capability of walking through matter; we have seen it in the cinema, usually used to get into the bank vault or perform some other evil deed. But in the cinema it was a power accorded only to a few, being so technically difficult. Computer power is available widely, and we must not be surprised that some people should turn it to their own ends in disregard of the general benefit of society. Jerry Schneider: Crook, Then Security Consultant Consider the case of Jerry Schneider. There is no problem with mentioning his activities. He sent an abstract of a paper that he wanted to present at the 1973 National Computer Conference, telling about how he tapped into a computerized ordering system and stole something like $1 million of telephone equipment by having it delivered to a telephone company van bought at auction. The computer program, not knowing how to bill and get payment, ignored it as being within loss limits. When turned in by an employee, Schneider spent two months in jail and was back in business as a computer security consultant I There is no question but that computer power may be abused by individuals. It may be so used by larger entities, such as corporations, to fool or defraud. It may be so used even by governments, however wittingly. Redressing the Balance Dr. Henry Bruck of M.I.T. spoke of this at ACM 70, in a talk enti tled "To Redress the Balance." His thesis was that computers, because of cost and training investment, were more likely to become the tools of government and big business than the general public. Countering the argument that minicomputers, microcomputers, and hand calculators are available to individuals at low cost, he said that it was a fallacy to assume that this meant that computer power was available to the general public for this reason. Shovels for a penny are useless unless one knows how to dig, and has arms. It is the usage skill that is important. He thought that modifying education so that imparting basic computer skills (and problem-solving techniques) would be given as much emphasis as learning one's own language would be unnecessary overspecialization. Nor would the answer be to reduce usage by government and business, for we have ever more need for decisionmaking information that is more likely to be accurate and complete, taking into account the overall advantage to people. However, he saw no reason why computer services could not be provided to the citizenry through puhlic institutions. 15 I agree. There are many opportunities for computer services to be provided by municipalities and/or private ventures. One can imagine data banks that could serve as advisories for human action and choices. There is an experiment in Los Angeles where the computer serves as a general counselor for a multitude of services. Consumerism could be served in a great many ways -- product safety and efficiency, comparative shopping, financing aid for major purchases, reminders for preventive maintenance, etc. Thus there are many ways to redress the balance by making computer power really available to everyone in a direct manner and without having to learn how to program. There is a need, however, for a certain amount of "computer Ii teracy" in order to feel comfortable with such usage. Mystique of Computer Authority As a tool, the computer has become commonplace with a rapidity exceeded by no other, even the automobile. This has caused some disallocation and unease, which the practitioners have not been able to avoid. Most major tools, when introduced, have had their custodians, and then their guilds or professions that, from gradual experience, added to the body of law and practice those safeguards for usage that appeared necessary from gradual occurrences of misuse. This did not occur with computers, and perhaps we did not even use the time that was available to us, so caught up were we with the mystique and power. Certainly we did not familiarize people generally with computers; instead, they were publicized as "giant brains," and the mystique grew into "authoritativeness." One of the main problems with authority is that it can be blamed. Surely you all know many examples, but I shall add a few to your knowledge. Perhaps it is a worldwide phenomenon. One calls the store that has made a mistake in the bill, the bank that has not returned the cancelled checks, the association that has blacklisted your credit -- and the voice replies "I'm sorry, sir, but we have a computer now ••• ". The Allen Piano Co. Lie The Allen Piano and Organ Company of Phoenix advertised by radio that its computer had made a mistake in ordering inventory; they were now overstocked and were therefore holding a sale. I wrote the company a letter, on behalf of the Association for Computing Machinery, offering to fix the computer or program so it would not make such a mistake anymore, on condition that "if it developed that a human was at fault," and not a computer, they would so acknowledge this in their subsequent broadcast advertising. Datamation magazine followed the story -- it turned out that the Allen Piano and Organ Company DID NOT HAVE a computer, nor did they use any computer facilities. Note the convictions of the advertisers that a computer would give authority to their spurious claim of overstocking. DUNGER, and not D UNGER, and not Dunger (for those with lower case capability). He received several replies, all saying that it was unfortunately impossible with their computer equipment. Learning of this from his letter to Computerworld, I called several of these data processing departments, to find in each case that the print chain was in fact an IBM chain that did have the apostrophe on it, but that they had not bothered to use it! It seems to me that a man's name is a dear possession, and not one to be treated cavalierly under cloak of computer authority. The Bank Lie I once visited a home where four elderly women were playing bridge. When they found out that I was in the computer profession there was a chorus of horror stories. Then one brought out a letter from her bank, with a handwritten apology from the teller for the shortcomings of the computer. I was on the spot. To save face I called the bank vice president to see what could be done. They didn't have a computer either! I.':' The Authority of the Computer as an Accomplice The computer is a convenient means of implicitly or explicitly covering activities that run from illegal to self-serving, intentional or unintentional. The notorious Equity Funding scandal will certainly become a classic, even though the exact ways that it was perpetrated will take some time to discover. We know, even now, that it was a pyramiding operation, and that computers were used to give authority and extra layers of protection from discovery. Many corrective actions could arise from the case, such as new emphasis on EDP auditing. It appears that perhaps as many as 200 people were involved in collusion. The University of Michigan has a research service that projects the effect of various decisions and actions upon the GNP (Gross National Product) and its growth, with respect to the State of Michigan. The results could easily be given in regular typewritten (or typeset) reports, but they are not! A computer printout accompanies the report to give it AUTHORITY. The set of results that I saw seemed both spurious and misleading, and perhaps others could have detected this had they been as unawed by computers as I am. Perhaps there may come a day when the US augments its Environmental Protection Agency with a Human Protection Agency. Then, taking the lead from the present requirement to make notification on cigarette packages that "cigarette smoking is dangerous to your health," it could order that each computerprinted page be preceded by: "WARNING -- these answers were produced by a computer, and could be hazardous to your health!" Of course I am being facetious about the overkill which does not seem to diminish smoking anyway, but I do recall the following case. "Sorry General, Three Years of Wrong Answers" The No·Apostrophe Lie One Mr. D'Unger, not of the computer community, \vrote to several companies maintaining mailing lists containing his name, either for billing or solicitation, asking them to please spell it correctly. Not 16 Univac was attempting to sell the US Army an 1107. The benchmark process included a compilation and run of a certain FORTRAN program. The 1107 compiler printed a diagnostic indicating an entry into the middle of a DO loop. The General in charge indicated that COMPUTERS and PEOPLE for January. 1975 C this was impossible, as they had been running that same program for three years, and asked a programrner to examine the situation. He returned in a short whi Ie and said "Sorry, General. Three years of wrong answers." Of course this particular manifestation of swallowing of data and not giving it back to anyone else could be largely solved by using labels and data description on data media, so that the data can be self-descriptive. Congressman Brooks of the US has called for a "declaration of independence for data." The Computer as a Sewage System Computer Failure A well-known trui sm of computer usage is "Garbage in, Garbage Out." But what happens when we put perfectly valid data in? Can we get it out again? Can someone else do so? If it does come out, is it legible? We still live in the computer era where 90% or more of the data depends entirely upon the associated program to be turned into information. The data description of COBOL is a start to improve this, but why should the description be appended to the program rather than to the data itself? Do you need a program to read a book in the library? At ACM 70, Dr. John Richardson of the US Dept. of Commerce said "Information Conserves Resources Through Better Decisions," but some of the valuable data that we need to make those better decisions is not, in fact, retrievable, exchangeable, or digestible. It cannot be turned into information. Indeed, one of the major findings in the various studies of data banks is that the sum of many small data banks is not a large data bank, at least not yet, contrary to the fears of many. And yet there are good as well as harmful reasons to consolidate data. If, for example, the US Congress had two reliable pieces of information -- 1) how much it was costing to not grow cotton, and 2) how much it was costing to promote the use of cotton -- the very juxtapo~ition might give rise to some better decisions. The organizing power of the computer depends completely upon legibility and interchangeability of data. Incompatibility of Data Banks A classic example is the situation that arose when the EPA (US Environmental Protection Agency) was formed by consolidation of several diverse groups, each with its own information systems. When they tried to consolidate the data as well, surely one of the main reasons for the coalescence, they found out that data could not only not be exchanged between various components, but not even between the several computer systems in the subdivisions of the agencies! And, of course, the air masses travel over many states, each state with its own computers and monitoring systems, and each computer incapable of making decisions that would optimize for the entire country, much less the world -- if that possibility were permitted. Illegibility of Computer Data without the Program Examples of the illegibility of computer data without the program are countless. Dr. Fred Whipple, the astronomer, once mentioned that only 1% of his information from satellite and probe vehicles was being processed. I corrected him slightly, to say "data," and he reiterated "information." I asked if anyone could process the tapes if the program were destroyed? He admitted that it_would be impossible. "Data" it was. The Las Vegas city police and department recently consolidated poli tan" Force. It will be many computerized data files can also be of efficient use. COMPUTERS and PEOPLE for January. 1975 county sheriff's to form a "Metroyears before their be consolidated to Another way of not being able to get data out is to have the computer system fail. Integration of computer systems into human affairs demands extreme reliability. We all know this, yet there are many times when one is tempted by the power of the computer to entrust to it a function that has some deadlines. I am guilty of this myself. We use a computer for text processing and publication. The problem is that we are forced to share a computer that is used for software experimentation and new system software validation, or for benchmarking in various configurations. While the hardware may be very reliable, newly-devEloped software is, unfortunately, not -- and we have entrusted our total text to the disk files. When difficulties occur, no manual methods, however desperate and strenuous, can be employed to do a makeshift job. It is the ultimately perfect job or none at all; we are at the mercy of a system that must be fully operational. The point of my story is that it is a human failing to be optimistic that the computer will be upl So one does not plan for back-up, duplicating files on another system, or batch methods that work even when timesharing is down. Now we cannot even reprocess the sewage. We have given the computer valid and useful data and cannot get it back until too late. Some Actions to be Taken for Human Protection Society long ago learned to impose minimum restrictions and educational or training requirements upon classes of workers whose operations affected the public safety or welfare. These constraints led to professions, with codes of ethics and a store of recommended practice often embodied in local law, such as building codes. Examinations by peers is a prerequisite to practice -- for doctors, lawyers, engineers, accountants, ad infinitum. Until now such restrictions have not been imposed upon the computer community; one can only suppose that the professions just mentioned did not materialize so 'abruptly before the social consciousness. Some public exposure of malfeasances moved the legislature of the State of California to consider, in 1971, the certification of computer programmers as a class. This was given attention by the press and, together with the fact that the legislature was in a quandary, it was sufficient for assistance to be asked of AFIPS (American Federation of Information Processing Societies). AFIPS convened a System Certification Committee in 1972 February. Certification of Programmers and Handbooks of Good Practice The committee arrived very quickly at the conclusion that there seemed to be no authoritative way to achieve certification. I proposed that a series of books of good practice should be conceived and constructed through AFIPS. Thi s proj ect is now underway. The first such book of good practice is on confidentiality and security, due to the very strong and justifiable interest in this topic at the moment, and is about to be field-tested. It is 17 largely in checklist form. As a minor note, the committee has changed its name to "Systems Improvement," to emphasize the fact that it does not feel that any form of certification is feasible yet. Reliability of Computers "Reliability for Integration into Human Affairs" was the title of one of the sessions of the 1973 National Computer Conference in the US. The session had a certain distinction. The other sessions were, by design, to reflect a "vertical" or "end use" orientation. Here I deliberately chose, in planning the program, to take a further step, to see what aspects of computer systems design were common to many end uses for the specific reason that they were directly integrated into human affairs. The panel included representatives from air collision avoidance systems, online patient monitoring, online power plant control, credit systems, ground transportation, and merchandising. Many of these applications are of Type 3; power control against blackout, for example, requires a response faster than a human can achieve. Air traffic control is another; in the 1980's there are expected to be 5000 people always in the air above Los Angeles, in 700 craft! The representative gave two major requirements: - Predictable reliability should be astronomical. - There should be "bai I-out" capabi li ty for whenever the system fails unpredictably. Dick Mills of the First National City Bank says that the bank has $8000 million per day in its interchange "pipeline," so that even a small leak drains a lot. It would seem that we are not being overcautious in insisting upon reliability in such "people-sensitive" applications. Protective Measures Against Misuse: Legal Measures: Safety Standards There are many examples of laws for involuntary personal protection. Construction workers must wear hard hats; cyclists must wear leather and helmets. These are occupational protections enforced upon the individual presumably because he represents an investment by society. The US Government has imposed certain requirements upon the manufacture of automobiles, i.e., to be constructed so as to withstand collision of X km/h without sustaining more than $Y in damage, or the like. The Government has stated that requiring such action is within its right to protect the safety of its citizens. It seems certain that the computer has a direct effect upon not only the safety of our citizens, but also upon other rights. It might thus be reasonable to demand that software and hardware should also be built to certain standards to protect these rights. '."I We are certainly going to have to build computer systems with facilities for confidentiality and security. Although there is no law on this, there is little doubt that US Government users will be demanding these features. "Fire-Drills" This second point created much discussion; Many of the builders of complex computer-controlled systems found that the people that ran such systems were seldom able to practice fixing them. When they did fail, they were not properly capable of coping. It was suggested that holding "fire drills" for such systems was a basic element of good practice. Searching for other elements of good practice, it appeared that none of the panelists or their design teams knew of any source or reference book to use for reliability aspects of computer usage, even though there was much commonality in their applications. There are some specialists in this field, such as Bob Patrick, but no body of knowledge is available generally. Patrick gives some examples of bad design: This area is covered comprehensively in "Legal Aspects of Computerized Information Systems," a US Govt. Report. See the Honeywell Computer Journal, Vol. 7, No. 1. Voluntary Measures: Ombudsman Dr. Harold Sackman, Chairman of the AFIPS Committee on Social Implications of Computers, called recently for a "computer user society of America." This was to be a computer citizen's group active in social reliability, for the reason that the computer community really gets to see the problems first, and has the responsibility to expose the problems to those who can treat them. The ACM owes much to the Scandinavian creation of the ombudsman; its ombudsman program has solved many problems of bad computer usage. Power to Audit - One computer installation had back-up tapes in a fire-proof vault, and "grandfather" tapes inside a mountain. But there was only one copy of the "run book" that told the operator how to read the tapes, and that was in the machine room, and would be lost in a fire. - A military installation had high security, and was very protective of the data. To ensure good readability, the tapes periodically had the first 20 metres or so clipped. The problem was that these tape strips were thrown away, under custody of garbage men without clearances, and they had not been erased! $300 Million a Year of Computer Crime Donn Parker, who chaired the above-titled session, is an authority on computer-related crime. His estimate is that this now amounts to $300 million a year, and will reach $2000 million in the 1980's! 18 There is a growing class of auditors versed in data processing, but we may have to take drastic measures to aid them. There are many current efforts for better methods for software construction. One hopes that increased simplicity will lead to more direct legibility and auditability of computer programs. Most programs are documented poorly, and I see only one hope of solution -- the program specifications, narrative documentation, and operating instructions must be integral! Using a block-structured language is vital to constructing auditable software. It also enables programmed devices to detect tampering with the running programs. Handbooks of Design and Practice Handbooks of design and practice are required to be available before computing can truly be a profession. Many computer societies are in various stages of using codes of practice and certification COMPUTERS and PEOPLE for January. 1975 it" of practitioners. One hopes that they will not stop short of general certification but will also adopt application-oriented certification in joint action with the professions of those applications. We will have to equip our systems with performance measuring and evaluation capabilities. Wastage of resources has been considered an evil in other fields before this. Zipcode as well as any other way? So I asked many data processing departments the same question. The answer was that they had not thought about it, and would just as soon do it that way. It may be as simple as that. Clark - o Continued from 'page 13 Recommendations ar he nts onthon tl j ' I .. l' ;,I "\ d- r s 1d- ~r Id As custodians of the power source we have many responsibilities. When I planned the ACM 70 Conference)it was as a model for a National Computer Year, which could possibly be followed by an International Computer Year. A possible list of goals for such a Year could be: - To conscIously put computers in service for international goals; to increase public understanding of computers, their role and potential; and to emphasize the computer as servant by more humanized use and applications. - To develop strategies for the best future use of computer systems (technological, social, educational, political, and legislati ve). - To conserve, and maximize utility of, those existing and future intellectual resources known as data and programs, by finding how to utilize them on mUltiple equipment and in multiple applications. - To aid ~overnment, business, and private decisionmaking by opening up new and more complete data for those decisions, and to facilitate the making of those decisions by reducing the information volume required (as opposed to data volume). - To plan a closed cycle for redistributing work assignments between people and computers, for re-education prior to change of assignment, so that people can best fulfill their potential. To ensure that public safety and welfare are considered adequately when computers are integrated directly into human activity. - To set up new and broad interdisciplinary paths for exchange of information among hitherto segregated organizations, and to foster their maximum involvement on an international scale. - To plan the most economical and effective interaction between computing systems and other systems such as communications. Interaction Between Computers and Society It is not too soon for a comprehensive examination of the interaction between computers and our society. Two papers from the 1973 National Computer Conference support this view -- "The Social Implications of the Use of Computers Across National Boundaries" and "A New NSF Thrust -- Computer Impact on Society." NSF is the National Science Foundation of the US. Easier than We Think? I believe that it won't be so difficult for computers and society to adjust to each other if we really put our minds to making it happen. 4. Carroll, John B., Editor, "Language, Thought, and Reali ty: Selected Wri tings of Benj amin Lee Whorf" , Technology Press, Mass. Inst. of Technology, Cambridge, Mass., 1956 5. Carter-Wooby, Amelia R., "Computers in Inner-Ci ty Classrooms," in "Computers and People," Nov., 1974" p.25 6. Childe, Gordon, "What Happened In History," Penguin Books, Inc., New York, NY, 1943 7. Dendy, Larry B., Ernst von Glasersfeld, and others, "Communication -- Three-Way: Chimpanzee, Man, Computer," in "Computers and Automation," July, 1973, p.7 8. Fromkin, Victoria, and Robert Rodman, "An Introduction to Language", Holt, Rinehart and Winston, Inc., New York, NY, 1974 9. Lai rd, CharI ton, "The Mi racle of Language", Fawcett Publications, Greenwich, CT, 1967, 255 pp. 10. Lorenz, Konrad Z., "King Solomon's Ring", Thomas Y. Crowell Co., New York, NY, 1952 11. Miller, George A., "Language and Communication", McGraw-Hill Book Co., New York, NY, 1951, 298 pp. 12. Mowat, Farley, "Never Cry Wolf", Dell Publi shi ng Co., New York, NY, 1963 13. Scott, John Paul, "Animal Behavior", Univ. of Chicago Press, Chicago, IL, 1958 14. Teitelman, Warren, '''Do What I Mean': The Programmer's Assistant," in "Computers and Automation," April, 1972, p.8 U nsettl i n9, Distu rbi n9, C ritica I . . . Computers and People (formerly Computers and Automation), believes that the profession of information engineer includes not only competence in handling information using computers and other means, but also a broad responsibility, in a professional and engineering sense, for: the reliability and social significance of pertinent input data; the social value and truth of the output results. In the same way, a bridge engineer takes a professional responsibility for the reliability and significance of the data he uses, and the safety and efficiency of the bridge he builds, for human beings to risk their lives on. Accordingly, Computers and People publishes from time to time articles and other information related to socially useful input and output of data systems in a broad sense. To this end we seek to publish what is unsettling, disturbing, critical - but productive of thought and an improved and safer planet in which our children and later generations may have a future, instead of facing extinction. In 1970 an Assistant Postmaster General of the US observed that a third of all first class mail is machine-addressed, but only 6% arrives on the post office docks in Zipcode order. He asked why the computerized address files could not be ordered by COMPUTERS and PEOPLE for January, 1975 The professional information engineer needs to relate his engineering to the most important and most serious problems in the world today: war, nuclear weapons, pollution, the population explosion, and many more. 19 IBM Versus AT&T: Its Meaning To The User And The Public t s t w w i f A. G. W. Biddle Executive Director Computer Industry Association Encino, Calif. 91316 i IT t "Observers now see IBM's entry into satellite communications as a major threat to the computer industry. " d \\ j' ,:! Based on an address to the EDP/Telecommunications Conference of your consideration: 'r of the National Retail Merchants Association, November, 1974. The subject of this article is IBM versus AT&T: Could this be the heavyweight championship business fight of the century? If so, what does it mean to the user and to the general public? Unnoticed Announcement After the close of the stock market on July 3, 1974, the Dow Jones wire carried a terse statement datelined Armonk, New York. International Business Machines Corporation had just announced it was purchasing controlling interest in CML, an authorized domestic satellite carrier. The timing of the announcement was significant, for the weekly trade and business journals had already gone to press and the business and financial desks of the daily newspapers were closed down for the long, 4th of July weekend. It was hoped that the move would go virtually unnoticed and unreported. It largely was. Initial reactions were mixed. A number of observers felt that AT&T would at last face some major competition and thus both the computer and the communications industries would benefit. However, John DeButts, Chairman of AT&T and an outspoken critic of any competition with the Bell System, said that he had discussed the IBM move with the chairman of IBM and foresaw no problems. The president of IBM assured the press that IBM was "not trying to put one over the left field fence." Major Threat to the Computer Industry A few -- unfortunately a very few -- observers now see IBM's entry into satellite communications as a major threat to the computer industry, the computer user, the telephone subscriber and, in the end, as a major threat to our nation. I include myself among this select, but rapidly growing group of vocal dissidents. Our ranks now include the Department of Justice, the Federal Trade Commission, Univac, Fairchild, Western Union, Datran, RCA and others. I would li ke to take thi s opportuni ty to share my thoughts and some of my deeply felt concerns with you. Qualifications of This Author First, however, let me submit my qualifications so that you may decide whether my views are worthy 20 9 b I: 'Ii - I have spent 20 years of my life as a specialist in the development of marketing and growth strategies for more than 50 major corporations, including some of our nation's largest. C In the past year, I have testified before six Congressional committees as to conditions in the computer and communications industries. j - And I am probably one of the few people in the world that have read and studied the 20,000 pages of internal IBM documents, studies and management committee minutes that have come to light as a result of the numerous antitrust suits against IBM. - And just so you will have no doubt about my biases, I am told that I am very high on the "enemies" li st at Armonk and moving up very rapidly on AT&T's. I have dared to speak outl Now, let me give you one man's opinion as to what is happening and, perhaps of more importance, what's in store for you, the user of computers and communications. First I will summarize and then come back and discuss each aspect in a little greater detail. AT&T, Heavyweight Champion In one corner we have AT&T, the heavyweight champion of the world. It has revenues of $26 billion, absolute control and ownership of the communications system, 25 percent net income before taxes, and 14 percent growth. One worker out of every 80 works for AT&T. AT&T has' failed to be responsive to the needs and desires of the marketplace -- especially in the areas of business oriented voice and data communications. This certainly comes as no surprise to this audience. The Federal Communications Commission has, since the now famous Carter-phone decision in 1968, been gradually opening up limited, specialized segments of AT&T's markets to competition -- first interconnect and then specialized terrestrial and satellite carriers. AT&T has used every means at its disposal to block the development of competition and maintain COMPUTERS and PEOPLE for January. 1975 , (, .~ its total monopoly power over all facets munications system. It has done this by interconnect, customer intimidation, and legal proceedings. At the moment, it is of the comrefusal to drawn out losing. AT&T, through its teletype subsidiary, has encroached upon IBM's territory with the data speed 40 terminal. It has also started marketing OEM. at e IBM, The Other Heavyweight Champion y. Now in the other corner we have International Business Machines. It has revenues of $12 billion, 25% net income before taxes, 15% yearly growth, and $4 billion in cash. During most of the 1960s, IBM fell behind the computer industry in technology, especially in the areas of peripheral products, terminals, minicomputers and solid state devices. s r- r r t. e /- '..... In 1970, IBM lashed out at the independent peripheral industry -- the Telex's and Memorex's -- for it feared that the independents might, in time, become viable across-the-board competitors. And in the meantime, strategies were being put in place at IBM to recapture its accustomed 7fJ'/o share of EVERY sector of the computer marketplace. IBM's Overall Strategy The elements of that overall strategy are now apparent. They include: 1- - F.S. (Future System): The fourth generation of computers will employ up to four parallel processors, mass storage and, in all probability, will be field expansible. A significant amount of maintenance will be performed by the user. System Q: A wholly new software system utilizing both conventional software as we know it and firmware. The system may be designed so that resource usage can be metered, with customers charged accordingly. - Custom Terminals: A family of unique, application-oriented terminals using extensive micro coding, new IBM de facto standard protocols and mid-life enhancements. - Data Security: In order to solve the dataprivacy, security problem, automatic encryption will probably be an integral part of each element of the system. IBM is spending $40 million over 5 years to study this problem; only the initial results will be in the public domain. The design of the locks to access will obviously be proprietary -- no interconnect will be possible. Satelli te Service: IBM -- preferably in collaboration with Comsat, but no doubt alone, if necessary -- expects to have a domestic satellite system operational within three or four years. Geared to government and business customers, it will be an integrated digital system with high speed data, voice and image capabilities. Unlike today's systems, it will not depend upon large ground stations connected to the user through AT&T local loops. Rather. the system, operating in the "X" band, will utilize a "multitude of customer dedicated antenna and only a few general-use ground stations." In essence, each customer wi 11 have an antenna on hi s roof. COMPUTERS and PEOPLE for January, 1975 - Carnation: To tie it all together, IBM will probably soon start marketing its "3750" electronic switching system in the U.S. A sophisticated PABX, the 3750 has been optimized for data switching but also has all of the features required for an integrated communication system, including "direct dialing, tie lines, data access, signalling, 60-cycle power, call directors, satellite connection and automatic overflow routing." Initially targeted at the larger user, where IBM has more than 65% of the installed base of computers, Carnation is expected to contribute $5 billion in revenues and over $1 billion in profit over the first five years of the program. - Bundled Service: IBM's strategy for the computer/communications world of the 1980s envisions complete end-to-end control of the total business voice and data communications network. This total system will include a telephone instrument on your desk, an IBM PBX, IBM terminals, IBM CPUs, IBM mass storage devices and IBM word processors -- all tied together by IBM satellite. There will be relatively few "foreign or competitive devices" in the system. IBM will not disclose communication protocols nor electrical, mechanical and logical interfaces until well after the market is locked up. In addition, scrambling and encryption techniques will be utilized as an umbrella over the entire end-to-end system. After all, everyone knows that the only secure system is a sole-source system, right? - Bundled Pricing: The opportunities to offer full end-to-end service allows IBM to bundle prices once more. By submitting a proposal to you that "solves your problem by providing a solution -- not boxes," IBM -- can as it has many times in the past -- freeze out any significant competition that might develop. Loss of Control of Peripherals I noted earlier that IBM had lost its control of the peripheral, minicomputer and terminal markets. I think the foregoing points make it clear that they are totally committed to regaining that control. It's a beautiful strategy. I'm sure there are elements of it I haven't touched on, for the Telex documents are now two years old. However, as you read the more than 4,000 pages of mihutes of the top management committee meetings of Messrs. Watson, Learson, Carey and Opel, one thing becomes very clear. They sincerely and firmly believe that the computer industry and all of its extensions belong to IBM. Trespassing is forbidden. They were disbelieving and shocked that CDC would dare to offer a super computer, better than anything IBM had to offer, or could ever build. They found it i"nconcei vable that customers flocked to Telex and Memorex tape and disk drives, or that Sanders was offering superior terminals. And the idea that independent software houses could increase the efficiency of an IBM system by 3fJ'/o or more was pure heresy. Dealing with Upstarts Throughout the four-year period 1960-1972, they wrestled with the problem of how to denl with these 21 upstarts. An overkill psychology gradually set in: they started searching for techniques that would make it impossible for others to impact IBM's growth and profits. The orders went out: stop interconnection of non-IBM equipment; prevent software enhancement, and midlife kickers; change standards; lower prices where competition is faced, raise them where it is not; use object code and micro codes wherever possible; scare the customer; do whatever it takes -but take it all. As you know, they almost succeeded in their attempts to put Telex and Memorex out of business. Even if they wind up paying Telex $256 million in antitrust damages, IBM's internal calculations show it to have been a profitable venture. They were losing a whopping 6% to 8% of their market overall; they bought time to implement their other strategies. both the national and international levels. Like Ma Bell, its monopoly control of the market depends on making interconnection with the system impossible or, at the very least, extremely difficult and costly. Lock-Out Techniques AT&T has retained its absolute monopoly power over the communications market for more than ninety years through four relatively simple lock out techniques: p a f u a a n p - Starting with a patent monopoly of Mr. Bell's invention, AT&T was able to monopolize the local exchange market. By challenging every other patent in the courts, it effectively delayed the development of competitive instruments for 15 years; t By interconnecting their companies with Long Lines and then refusing to interconnect nonBell independent companies, it killed off competition; 1 f s s s "No-No" to Banks and Wall Street Perhaps of even more importance, IBM made it quite clear to Wall Street and the banks that investment in a company that dares to compete with IBM on any terms but IBM's is a no-no. The long range impact of this is just now beginning to show. The mere announcement of IBM's entry into the point-of-sale market forced Pitney Bowes' withdrawal, and I suspect others are soon to follow. The mere announcement of IBM's satellite move has caused the financial community to re-evaluate whether additional capital will be made available to the other terrestrial and satellite carriers. Several will probably have to sellout to the giants if they are to survive. In 500 IBM Top Meetings, Discussion of Responsibility to User: Just 3 Times Before I leave this subject, I would like to make another observation about the deliberations of IBM's top management, as reflected in the Telex documents. During the course of over 500 meetings, each ranging from one to three days over a four-year period, IBM's top management discussed you, the user, and their responsibility to you only three timesl Many of you in this audience -- particularly the IBM employees present and the loyal IBM customers -are undoubtedly thinking "What right has he got to knock IBM? They're a great company and they've done a great job." To you I say, I agree. IBM is probably one of the best managed, most aggressive companies in the world today. It has made many valuable contributions to the field of data processing and to our industry. - By controlling all system architecture and by producing all of the equipment used in the system, it was able to prevent the development of industry standard interfaces and thus block interconnection; - And lastly, by manipulating the weak and unsophisticated FCC, it was able to cast its anti-competitive practices into bronze in the tariffs that "regulate" the industry. Monopoly Techniques I think if we look at these four strategies in the context of IBM, we will quickly see some interesting parallels in their monopoly tactics: - IBM started in the 1920s with a patent monopoly on punched card equipment, and it soon capturea 90% of the market. The rest it shared with Remington Rand. - As the fledgling computer industry developed, devices were needed for the input and output of data. What would be more logical than the punch card since it already contained much of the user's data? - Remington Rand, however, under pressure from IBM, refused to sell peripheral equipment to the fledgling computer industry; and IBM would only sell at its full retail price and then only after its own customer's needs had been met. Innovations: By Other Suppliers, Not IBM It has not, as it otherwise would like you to believe, been the innovator in this industry. Almost every major advance in the state of the art has first been developed and brought to market by others. IBM's world renowned laboratories may have already invented the products you will be using in 1990 -- but they are of no use to you. They will not be made available until IBM has first extracted every possible cent of rental income and profit from the equipment it rents you today. Interconnection Strategy: As Difficult As Possible Instead of taking a leadership role in the development of standards that would permit healthy competition to develop, IBM blocks and delays at 22 - Needless to say, IBM soon had more than 80% of the installed base of CPU's under its absolute control. - By maintaining a separate and distinct software approach from that of everyone else in the industry, IBM was able to control the upward migration of its user base. By controlling all system architecture -- hardware and software -- and by producing all of the equipment used in the system, it was able to prevent the development of industry standard interfaces and thus block interconnection. - And lastly, by smothering the customer with tender love and affection -- lots of "free" COMPUTERS and PEOPLE for January. 1975 software and services -- and by keeping the DP manager out of trouble with his boss, the user remained largely unsophisticated and passive. And, the pied piper led us down the road to Utopia. Central Nervous System of the U.S. Economy: In the Hands of One Company We've been good little mice. IBM's revenues have grown 15% per year, compounded, to $12 billion. More than 70% of the installed base is still IBM. And no competitior has been able to capture more than 5% of the market except by picking up the lease base of a fallen comrade. We have, individually and collectively, placed the central nervous system of our total economy in the hands of one company. If IBM's field service organization were called in for a two-week refresher or were unionized and struck, America would grind to a total stop. No bank, airline, trucking company; manufacturer, stock exchange or telephone company would be able to function -- because as each day goes by, each one becomes more interconnected with the other and with the seven IBM systems out of every 10 systems in use. oat When you place this fact in context with IBM satellites, IBM PABX's, IBM point of sale, IBM electronic funds transfer, and IBM networks -- the implications are frightening indeed. Again, the IBM apologi sts wi 11 say, "That's the American system; IBM climbed to the top of the heap, and more power to them." g Competitors: Half ,Starved for Capital I say in response, IBM started at the top of the heap in the 1920s, and since then it has used its market power and control to keep its competitors half starved for capital and its customers too blinded by IBM's power and IBM's image to find their way out of their cages. d It is said that ours is a very competitive industry. I ask you, how competitive is a race between Secretariat, five mules and 60 lame ducks? It's not even fun to watch. e And that leads me to my last and final point: 9 e 0% v- But Competition is Healthy Our system is based on the concept that the forces of competition will assure the fullest employment of our resources for the good of the many. Those who succeed in winning the game are rewarded with profits, which in turn they can plough back into the business for the production of more beneficial goods. Or so the theory goes. What happens when the forces of competition no longer work? What happens when the King of the Mountain can -- through sheer muscle, sophisticated and subtle anti-competitive practices (many hidden under the guise of technology), political clout, and monopoly market control -- block the efforts of even the strongest to climb the hill? What happens when the RCA's, General Electrics, Bendix's, Honeywells, Littons, Philco Fords, Univacs and Singers finally give up trying? What happens when the Carters, MCI's, Datrans, Telecoms, Storage Technologies and Stromberg Carlsons of the future don't even get to try, because Wall Street and the bankers have learned you COMPUTERS and PEOPLE for January. 1975 can't beat IBM or Ma Bell? Monopoly Means Higher Costs Let me suggest what I think will happen. You will have one source of supply for residential phone service -- AT&T -- and your costs will skyrocket. You will have one source of supply for worldwide business information systems -- voice, data, data banks and word processing, and all -- IBM, and you will pay dearly. And your customer will pay dearly. You will wish you had the problems that you have today -- the problems of evaluating rapidly changing competitive offerings in communications, terminals and minicomputers. Regretfully many of you will leave the pioneering to "the other guy." History will probably repeat itself -- you'll tryout what data processing can do for you with an entry level System 3. After it's too late, you will find that it just won't interface with that better, less expensive terminal being offered by competitor A, or that you can't process the combined results of your suburban stores without adding more memory -- IBM memory of course. And just as the 402 User became the 1401 User and in turn became the 360-50 User and the 370-158 User, you will find that you are in a cage. The cost of conversion to get out will be prohibitive, and your only choice will be to follow (and pay) the piper. In all fairness, much of what I have just said is equally true if you are a beginning user of anyone's mainframe. The Honeywell's, Univac's, and NCR's would love to offer you standard interfaces -- they know they can successfully compete on price and performance. But if standards were adopted, they fear IBM would take away what little of the market they have. And IBM fears that the adoption of open interface standards would"erode their market control and lease base." And you, ladies and gentlemen, are the victims. Worse yet, you get it coming and going; for your store has to pass the cost of the monopolists' profits on to the consumer -- and that's you again. Is there any wonder as to why your paycheck buys less each day? Growing Resistance by Users to Higher Costs The National Retail Merchants Association has made a major contribution in the growing resistance to the misuse of AT&T's monopoly power. Ma Bell is in trouble. People finally have realized that the only so-called "natural monopoly" is the wire, cable and switching equipment in the local service area. The_customer should be able to choose and install any properly certified terminal he wants on the end of that pair of wires. The local operating companies should be able to procure Long Lines service from anyone or all of the terrestrial and satellite carriers at the lowest possible cost. The operating companies should be free to purchase the equipment they use in open and competitive markets. In short, the telephone monopoly should be broken. But IBM is going to bail them out. After all, how could a poor little old restructured Ma Bell compete with a giant monopoly like IBM? Perhaps of greater significance, IBM will get the MCIs, Datrans, Western Unions and other competitors out of Ma Bell's hair, so that just the two of them can then compete like proper gentlemen -- at their accustomed 25% pre-tax net and controlled 14% per year rate of growth. 23 Time to Stand and Fight Monopolies We think the time has come to stand and fight on both fronts -- computers and communications. It's time you, the user, told your suppliers to grow up and put their childish games aside. It's time you told the FCC, Congress, AT&T and IBM that all interfaces, codes and protocols be fully disclosed -both hardware and software -- and that they must be disclosed early enough to allow you to choose between the compatible and competitive offerings of at least three vendors, or you won't play. Separate Pricing, a Key You should insist that all elements of a product or service offering be separately priced. It's interesting how they all proclaim that mixed systems can't be done, yet they interface overnight when NASA or some other significant purchaser mandates itl The users and the public should ask the FCC and the Congress to mandate that all equipment purchased for use in the Nation's communications system -- be it local service, terrestrial or satellite -- be procured on an open competitive bid basis. Furthermore, there should be no joint or bundled marketing efforts between CML, IBM, the AT&T operating companies or Western Electric. All transactions should be at arms length. No strategies intended to lock you, the user, into a sole source system should be tolerated. Nor should anti-competitive and exclusionary tactics be permitted. Do these things and someday you shall be free -free to choose what's best for you and your company, not just what's best for AT&T's and IBM's profit and loss statements. Retailing as an Example of Strong Competitive Business Perhaps I've hit too hard. If so forgive me -but the National Retail Manufacturers Association is an audience that represents one of the few remaInIng examples of the free enterprise system at work in America today. These firms, whether in furniture, clothing, or general merchandise, have not ducked under the protective umbrella of government regulation. They have not felt the palsied hand of bureaucratic regulation on their shoulder as have our railroads, our airlines, our trucking industry and our public utilities. They have not adopted accounting principles that guarantee bankruptcy if there is the slightest change in the status quo. In the greatest traditions of the American free enterprise system, the retail business is a business in which anyone who chooses may participate: There are no major barriers to entry. Retailers are free to succeed -- or to fail -on their own merits. If they are sensitive to the needs and desires of the consumer; if they give him or her what they perceive to be a fair value; if they make doing business with them a pleasant experience -- they will grow and prosper and receive the rewards of a grateful society. In retailing, the consumer, in his ultimate wisdom, is the final decision maker. If the retailer fails to satisfy his or her needs, he will fail. 24 There are not likely to be any guaranteed government loans to bail him out; there is no government agency to prohibit a more astute competitor from opening up across the street. They do not have monopoly control over all sources of supply of the products they sell, nor can they dictate style, fashion or taste all by themselves. In fact, each day a retailer continues to prove the fundamental economic principles that we all learned in high school and college -- lower prices tend to increase volume and total profits. It would seem that our automobile manufacturers and other near monopolies have their own private set of economic principles. When business is good, they raise the prices -- when business is bad, they raise prices again. Why does the consumer put up with it? Because there is no place else to go -- there is no meaningful competition in the concentrated industries. Crisis The situation is rapidly approaching crISIS proportions. The Arabs are very conservative investors -- they will put their money in land and in monopolies. After all, who knows better the power of a Cartel? So they will largely invest in the IBMs, AT&Ts, General Motors and other corporations dominant in their respective industries. The Arabs fully recognize that the economic importance of each of those companies to our nation and their large number of employees forces the politicians to see that the Government stands behind them as the employer and banker of last resort. Money invested in these companies is as good or better than money invested in Government bonds. Our institutional investors have also learned this lesson and that's why we have a single tier market. And their prophecy becomes self-fulfilling because everyone below the Fortune Top Fifty dies for lack of capital, and the wisdom underlying the "prudent investment" principle is born out. 11 handful of corporate giants will then control the assets of our nation. Heading the list will be our friends AT&T and IBM, the bluest of the Blue Chips. Of course, the unions will have to increase their power in order to maintain equality, and Government will have to grow to maintain balance. When the concentration of power is complete, where do you and I -- the disenfranchised voters, the taxpayers and consumers of our nation -- stand? o Please think about it. 8+01:) +0(JV"* o ·1· El \l l:) 0+-\\-\7*0 \7 0 + 08+*VO +8 O'V \l o~"Vx J::)" V 0 COMPUTERS and PEOPLE for January, 1975 If Ims Ir1- lal The Teaching of Computer Science: Master of Science Degree J. N. Snyder Head of Department Department of Computer Science Univ. of Illinois at Urbana-Champaign Urbana, III. 61801 "Every educated person should have some understanding of the principles on which computers operate." d CS/SE ED 357, ComputerAssisted Instruction .............. 1 unit Here is a description of a new educational program being offered by this department. We believe your readers may be interested. CS/~~TH 367, Computer Application to Problems in Mathematics ........ 1 unit Purpose t Computers are playing an increasingly pervasive role in our society. Therefore every educated person should have some understanding of the principles on which they operate; and many will need varying degrees of skill in their use. 2) ED PSYCH 311 and 312 Elective Sequence (2 units): These elective courses are chosen with the help of the student's adviser as a sequence for specialization in some area related to computer science, dependent on the student's background and interests. The objective of this new curriculum is to prepare competent and well-qualified teachers of computer science for undergraduate colleges, junior colleges, vocational-technical colleges, and high schools. An applicant will be favorably considered for admission if he: holds a baccalaureate or higher degree equivalent to that granted by the University of Illinois, has a grade-point average of at least 4.0 (on a scale with maximum 5.0) for the last sixty hours of undergraduate work, and has had at least one course in computer programming. Applicants with an ~verage below 4.0 but above 3.75 will be considered on an individual basis. 1/2 unit Educational Policy Studies (Two courses selected from the group 300-307) ................ 1 unit Many jobs will bring non-computer specialists into positions where they should use computers. Thus, to not expose today's students to computers means giving them poor preparation for the world in which they will have to live. Admission Requirements Education (2 units): Teaching Project In addition to the course requirement, each student under the supervision of his faculty adviser is also required to complete a teaching project in computer science. This requirement will normally be fulfilled in connection with 'specified course work in the curriculum, the electives or individual study courses, or by virtue of the student's current or past employment. Some alternatives (all of which yield either course credit or remuneration for the student) are: The Curriculum The eight units of graduate credit required for the degree are listed below. A unit is approximately equal to four semester hours. If a student enters the program with only one course in computer programming, he may have to take one or two undergraduate courses, also. 1) Computer Science (4 units): CS 321, Information Structures or CS 323, Machine Language and System Programming 11 ......•••.... I unit CS 333, Computer System Organization ..................... . COMPUTERS and PEOPLE for January. 1975 1. Service as a teaching assistant. 2. Past or present service as a teacher in a public, secondary, or community school. 3. The practice being required for state certification. 4. Preparation of PLATO material either in an individual study course or as part of a CS/SE ED 357 project. 5. Tutoring and/or grading under special circumstances. unit 25 THE 20th ANNUAL EDITION OF THE Computer Science Courses CS 321 -- Information Structures: Lists, trees, and graphs; applications to string processing and pattern matching; storage allocation, and collection of unused memory space. Prerequisite: CS 201. 3 hours or 1 unit. CS 323 -- Systems Programming: The organization and structure of operating systems for various modes of computer use from simple batch systems to time-sharing/multiprocessing systems is discussed. Prerequisite: CS 201. 3 hours or 1 unit. COMPUTER DIRECTORY AND BUYERS' GUIDE, 1974 . .. IS PUBLISHED - A SPECIAL 13th EDITION of COMPUTERS AND PEOPLE The COMPUTER DIRECTORY AND BUYERS' GOlDE is: • an annual comprehensive directory of the firms which offer products and services to the computing and data processing industry . • a basic buyers' guide to the products and services available for designing, building, and using computing and data processing systems. CS 333 -- Computer System Organization: Computer system analysis and design; organizational dependence on computations to be performed; and speed and cost of parts and of overall machines. Prerequisite: CS 201. 3 hours or 1 unit. CONTENTS (over 160 pages) CS/SE ED 357 -- Computer Applications to Problems in Mathematics: Roster of Organizations in Computers and Data Processing Buyers' Guide to Products and Services in Computers and Data Processi ng Special Geographic Roster of Organizations in Computers and Data Processing Characteristics of Digita I Computers (14,000 entries for 380 computers made by 80 manufacturers) Survey of Programming Languages in Business A Short Guide to Programming Languages Over 2600 Applications of Computers and Data Processing Roster of College and University Computer Facilities Roster of Computer Associations Roster of Computer Users Groups World Computer Census Some Basic Arithmetical Tables American Standard Code for Information Interchange (ASCII) This course discusses many problems which can be formulated mathematically and lend themselves to computer solution. Problems are chosen from the following major areas: applied statistics, in particular Monte Carlo techniques and simulation; combinatorics; symbolic algebra; game playing and decision problems. Prerequisite: Junior standing and CS 121 or other Computer Science 100-level programming course; or the consent of the instructor. 3 hours or 1 unit. Financial Assistance Many graduate students in computer science receive some financial assistance while attending the University of Illinois at Urbana-Champaign. Many of these students are employed part-time as teaching or research assistants. To encourage students to make satisfactory progress in their courses of study, assistantships ordinarily are limited to one-half time. PRICE: • Mexico - $21.95 (Prices include $.45 postage and handling costs) Elsewhere - Swiss francs 90 For further information on financial assistance, the Master of Science in the Teaching of Computer Science degree, or other programs in computer science at the University of Illinois at Urbana-Champaign, please write to me. 0 Who's Who in Computers and Data Processing 6th Cumulative Edition, scheduled for 1975 Send us your entry, saying: 1. Your name / 2. Home address / 3. Your organization / 4. Its address / 5. Your title / 6. Your main interests / 7. Your year of birth / 8. Your education and degrees / 9. The year you entered the computer field / 10. Your present occupation / 11. Your publications, honors, memberships, and other distinctions. o The Directory is included in the full annual subscription (13 issues) to Computers and People: U.S.A., $23.50; Canada, $24.50; Mexico, $32.50; elsewhere, Swiss francs 140. (magazine address label is marked *D) RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY ~ - - - - - - - - - - - (may be copied on any piece of paper! - - - - - - - - ELSEWHERE, to: I , ( Reliable Information Publishing Company P.O. Box 52 6354 Vitznau, Switzerland Yes, please send me ( ) copy(ies) of the 1974 Computer I Directory and Buyers' Guide. I I enclose: U.S.A. Canada _ __ Mexico _ __ Elsewhere _ _ _ _ _ _--.-_ I My name and address are attached. I' 26 i : U.S.A., Canada and Mexico, to: Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 For the full entry form, see inside the front cover (page 2) in the November 1974 issue. Send to: Who's Who Editor, Who's Who in Computers and Data Processing, RFD I, North Grosvenordale, Conn. 06255. Canada - $19.95 U.S.A. - $18.95 COMPUTERS and PEOPLE for January. 1975 -~ NIXON, FORD, AND THE POLITICAL ASSASSINATIONS IN THE UNITED STATES Richard E. Sprague Hartsdale, N. Y. "Any reasonable hypothesis about what is really going on based on the evidence at hand, has not been even remotely suggested by either Congress or the media." The Pardon of Nixon Gerald R. Ford pardoned Richard M. Nixon on September 8, 1974. Thus the latest act in a drama that began in 1960, unfolded. Many skeptical U.S. citizens nodded their heads knowingly and assumed Tricky Dick had made his "deal" with Ford, when he nominated him for Vice President. Evans and Novak\l/ assumed that Julie Nixon Eisenhower talked Ford into the pardon on grounds of poor Nixon health and family considerations. The Ford explanations of fears for Nixon's health didn't seem to convince very many news media people who saw a seemingly robust expresident in San Clemente.\2/ The pardon seemed to most Americans and news editors, a gross error in judgment and a total miscarriage of justice. Once again, the United States as a whole was fooled. This time, both Nixon and Ford managed to pull the wool over the eyes of the public and to narrowly escape revealing what can be called "the entire rotten crust at the top of American power." Any reasonable hypothesis about what is REALLY going on, based on the evidence at hand, has not been even remotely suggested by either Congress or the media. But here is a hypothesis which can be· argued to be reasonable. A Reasonable Hypothesis A reasonable hypothesis about the situation leading up to the pardon, must begin with the relationship through the years between Gerald Ford and Richard Nixon; and it must go back to 1960, the year Mr. Nixon planned the overthrow of Castro's Cuba. plans for an invasion.\S/ When he narrowly lost to Kennedy, it created a deep wound and he apparently spent much of the next three years planning what might be called revenge. During the 1960 to 1963 period Nixon became well acquainted with a number of violent-tempered or coldhearted Cubans and Americans, both inside the CIA and outside. They agreed with him that casting out Castro was highly desirable. One of these men was E. Howard Hunt.\6/ Another was Bernard Barker.\7/ A third was Carlos Prio Soccarros.\8/ The Cabal In a perhaps separate effort of their own, these Nixon cronies and financial partners became involved with the Cabal that murdered John Kennedy.\9/ Whether Nixon was directly involved in the Cabal's planning for the assassination is still open to some question, although one researcher believes that he was. \10/ There certainly is substantial evidence that Nixon was out to sink Kennedy and Johnson, at least politically, and aimed to do so in Dallas immediately before Kennedy was killed. (See the section below on evidence)\ll/ At any rate, whether Nixon was or was not directly involved in planning the assassination of President John F. Kennedy does not have to be settled here, because Nixon WAS directly involved in covering up the truth about who did the deed. Recently revealed evidence from the Nixon-Haldeman tapes indicates that Nixon knew the truth about the assassination when he suggested Gerald Ford for the Warren Commission.\12/ Ford and Nixon In 1960, 'Nixon was the White House action officer on the planning for what turned out later to be the Bay of Pigs invasion of CUba.\3/ The Overt.hrow of Castro Prior to that time Nixon had accumulated plenty of reasons to want Castro overthrown. The antiCommunist attitude was the reason on the surface. Underneath were Nixon's connections with the Mafia, and his friendships and financial holdings that were greatly damaged when Castro closed all the Casinos run by the mob in Havana.\4/ When Nixon and Kennedy debated about Cuba in the 1960 campaign, Nixon purposefully lied to the American people about U.S. COMPUTERS and PEOPLE for January, 1975 The hypothesis then continues with the close personal friendship of Ford and Nixon in their days together in the Congress, when both were strong, ultra-conservative, "red white and blue," antiCommunist, "religious" members who thought and talked alike. When Nixon realized that John Kennedy had been killed almost under his nose on November 22, 1963, in Dallas, Texas, by some of his Bay of Pigs friends, he decided to do everything in his power to cover it up and to bide his time until his powerful military and intelligence friends could get him placed in the White House. It took one more murder by the Cabal 27 (Robert Kennedy) to get him there, and still another attempted murder to keep him there (George Wallace). Control Over Investigation of Assassinations Control over the investigations of these murders was essential for Nixon and the Cabal. In order to guide a presidential commission away from the truth, the closed small circle of people who knew what had happened to John Kennedy had to be enlarged. Allan Dulles was no problem. He knew the cause was an intelligence-military Cabal from the day it happened, forward. Earl Warren was a tougher nut. He had to be fooled and later on, talked into keeping silent "for the good of the country." Gerald Ford's Book To have a ring leader inside the Warren Commission was critical. It had to be someone Nixon could really trust. Someone who had at least the appearance of being honest and trustworthy to the people. Nixon called on his old pal, Gerry Ford. He convinced LBJ that Ford should be on the Commission.\13/ Then, the hypothesis continues, that Nixon told Ford at some point prior to January 1964 who killed JFK and why, and he convinced Ford that every effort should be made to make sure Oswald was found to be the lone assassin. Ford did an excellent job. He not only steered the Commission away from the facts \14/ whenever a key witness was interviewed or an embarrassing situation developed, he also nailed Oswald's coffin shut personally, by publishing his own book on Oswald\lS/: "Lee Harvey Oswald -- Portrait of The Assassin". This, coming from the chairman of the House Armed Services Committee, served to firmly plant in the minds of Americans the idea that there was no conspiracy, that Oswald was THE lone assassin, and that the Warren Commission had done a good job. Access to Power From the day Ford's book was published, Nixon and Ford became totally beholden to each other. They also both became totally beholden to the members of the Cabal who were at or near the top of it or who were part of the small knowledgeable circle. Other members of what will henceforth be called the inner circle, included J. Edgar Hoover, while he was alive, and Richard Helms. Under this hypothesis, no one could be permitted to come into power in the White House, or the CIA or the Justice Department or the FBI, unless they were part of the inner circle and willing to keep quiet and help suppress the truth about the JFK assassination. This inner circle widened, of necessity, when Robert Kennedy was killed, and Nixon became President. Both the people involved in killing Robert Kennedy, and Nixon's top aids had to be told the truth. This included Haldeman, Ehrlichman, Kissinger, and possibly others in the White House, and Mitchell. Mitchell also had the job of controlling Hoover's successors in continuing the cover ups. Mitchell was instrumental in stopping .Jim Garrison's investigation of Clay Shaw and the rest of the Cabal and in totally discrediting Garrison.\16/ He was aided of course, by Richard Helms and others in the inner circle by thorough CIA support in the Clay Shaw trial cover-up efforts.\J7/ 28 Assassination Attempt Upon George Wallace In 1972, the White House plumber section of the assassination Cabal decided, perhaps without Nixon's knowledge, perhaps with his approval, to assassinate George Wallace. In this way, Nixon would receive ALL of the conservative vote. Again, the inner circle grew, and the debts grew. E. Howard Hunt and Charles Colson, along with Tony Ulazawicz, Donald Segretti and others, were in a position to make demands in exchange for their silence. The Hunt $1 million blackmail threat to reveal "seedy things" or "hanky panky," was never really explainable because he might talk about the Watergate or Ellsberg break-ins. Three assassinations, (JFK, RFK, Wallace) on the other hand would certainly be worth a cool million to keep one's silence. Again, the Haldeman-Nixon June 23, 1972, tapes are revealing.\18/ (See later section on evidence) The Watergate Crisis Now arrives the Watergate crisis. Nixon is trapped by his own tapes. The hypothesis continues that discussions with Haldeman, Mitchell and others mention the Kennedy assassination Cabal and the Wallace murder attempt. The Cabal and the inner circle are suddenly threatened as a group. The tapes can't all be destroyed because too many Secret Service people know about them. Haldeman and Nixon manage to erase one 18-1/2 minute section which is the most revealing about the assassinations, but the rest are still around. And who can remember exactly when telephone or Oval Office conversations may have mentioned the truth about the three murders? Succession to Nixon Nixon, sensing again the need for a successor who will keep quiet, calls on Gerry Ford when Agnew is forced out. The two of them, bound inextricably together by their mutual cover-up of the assassinations, work out a deal. Nixon nominated Ford as Vice President. The Senate, completely bamboozled by Nixon and Ford, did not ask Ford any important questions about the assassination's nor his performance on the Warren Commission. They did ask Ford about his book and he committed perjury two times befor~ the Senate. Nixon and Ford agreed that Ford will keep quiet if Nixon keeps quiet, and that if necessary, Ford will succeed Nixon if he is forced to resign, or be impeached, with an agreement for a pardon afterward. But, the most critical part of the arrangement is that those tapes revealing the truth about the assassinations be kept out of circulation. The two men must keep theiT cover-up going. Each is now fully culpable. When the Supreme Court ruled that the tapes must be turned over, it was then time to implement their agreed-upon strategy. In addition, Jaworski, Colson, Mitchell, Kissinger, Haldeman, Ehrlichman., the Warren Commission, Hunt, Helms, Shaw and anyone else in the inner circle has to be bought off, pardoned, protected, or killed, to keep their silence. Jaworski's Resignation Leon Jaworski resigned and people ask why. The real answer again lies buried in the fact that Jaworski knows what has been going on. One way he knows is through the assassination conspiracy and cover-up information passed on to him by the Ervin COMPUTERS and PEOPLE for January, 1975 Committee and Cox. A second way is through his own involvement in 1964 in the JFK cover-up. In any case he will have to be taken care of. d nt r Jaworski could be a problem, even though he helped with the JFK cover-up from the beginning. 19/ Hunt has already been taken care of by getting him out of jail, buying him a large estate in Florida, and paying him a lot of money.\20/ Helms can be counted on. Kissinger may have been a problem, but he agreed finally. His wiretaps were likely ordered to find out who knew about the assassinations. Hoover is dead. Clay Shaw was murdered.\21/ Out of the Warren Commission, Warren is dead. Boggs was killed. Dulles is dead. LBJ is dead. Richard Russell is dead. John Sherman Cooper was bought off by giving him an important ambassadorship. John J. McCloy is too old to worry about, and of course Ford is O.K. That leaves Colson, Mitchell, Haldeman, and Ehrlichman, plus some other small fry. The Nixon-Ford strategy as planned with these men, must have involved pardons for all of them in exchange for their silence, especially Haldeman and Mitchell because they not only knew what happened to JFK, but took overt actions to cover-up. (Haldeman erased the 18-1/2 minutes of tape and Mitchell nailed Jim Garrison.) The pardons may have to wait until the trial is over, but they are agreed to in advance. New Members of the Inner Circle Newer members of the inner circle may cause some problems. They all have to know the truth by now. Rockefeller and Alex Haig must know and have agreed to silence. William Colby, William Saxbe, and Clarence Kelly know because of their access to the records; so they must have agreed to cover-up continuance. Of extreme importance is Saxbe's and Kelly's control of the new trial and hearing coming up for Sirhan B. Sirhan and possibly an investigation of Arthur Bremer. Also Ford and his cronies in the House must knock out any efforts by Henry B. Gonzalez of Texas to start a new House Committee investigation of the JFK assassination. Haig seems to have been bought off by promising him a top NATO post in exchange for his silence. In this hypothesis, Gerald Ford is stuck. He must remain committed to the Cabal and to Nixon. Whatever assassination the Cabal may undertake in 1976, he must close his eyes to it, and continue covering up. Ted Kennedy, George McGovern, and Eugene McCarthy would have had very little chance of surviving the situation if they showed election promise in 1976. Also the tapes must be controlled and edited at all costs. Nixon no doubt required help in listening to the tapes after Haldeman left and sorting out those in which assassinations and cover-ups were discussed. General Haig was logically the man he selected to do this dirty work. It is almost certain that no tapes could be turned over to Judge Sirica or to Jaworski with any assassination references left on them. One of the tapes demanded by Jaworski had such references. This is the recording made on June 23, 1972, in which Nixon and Haldeman are discussing Watergate, just six days after the break in. The Nixon transcript of that tape turned over to Judge Sirica upon orders of the Supreme Court, shows many sections labelled unintelligible. It is a near certainty from three parts of the discussion that COMPUTERS and PEOPLE for January. 1975 day, that the critical sections were edited out by Nixon and General Haig prior to turning them over to Sirica and prior to making a transcript. Judge Sirica is the only person in the chain of possession of that tape who could be counted on to make a scientific analysis of the tape to see whether it was tampered with before he received it. The hypothesis would be confirmed if erasures or noise superimposed on sections of that tape were found by such an analysi s. With regard to the rest of Nixon's tapes which are still in Gerald Ford's possession and control, there may be many references to assassinations and cover-ups. Rather than go through all of them and edit or erase the critical material, it is much more likely that Ford will either turn them over to Nixon for total destruction, or sit on them forever without letting anyone not in the "inner circle" hear them. The Evidence for This Hypothesis The evidence supporting this hypothesis is as follows: 1. Nixon was White House action officer·on Cuban invasion plans 1960. Source: "Compulsive Spy," Tad Szulc, Viking Press, 1974 2. Nixon was in contact with Hunt, and others during Bay of Pigs planning. Source: Nixon, Bay of Pigs & Watergate -- R. E. Sprague, C&A -January, 1973 3. Nixon lied to the American people by his own admission about the Bay of Pigs during his TV debates with Kennedy in 1960. Source: "Six Crises" by Richard M. Nixon 4. Nixon was linked financially to the Mafia and the Cuban Casino operations before Castro took over. Source: "Nixon and the Mafia," Jeff Gerth, Sundance, December, 1972 5. Nixon was acquainted with Hunt, Barker, Martinez, Sturgis, Carlos Prio Soccarros, and other Watergate people and anti Castro people in Florida, and was financially linked with Barker, Martinez, and Soccarros. Source: "Nixon & the Mafia" and "Nixon, Bay of Pigs & Watergate" 6. Hunt, Barker, Sturgis & Soccarros were connected with the assassination Cabal in the murder of JFK. Source: R. Sprague -- several articles lately. CIA article, Nixon Bay of Pigs article, Bullets or Ballots 7. Nixon was in Dallas for three days including the morning of the assassination. He was trying to stir up trouble for Kennedy. Source: Warren Commission Exhibits -- Vol. 23, Pages 941-943 8. Nixon went to Dallas under false pretenses. There was no Board meeting of the Pepsi Cola Company as he announced his law firm had to attend. Source: Pepsi Cola Co. list of board meetings. Corporate Records 9. Nixon did not admit being in Dnllas on the day Kennedy was shot and did not revenl the true reason for his trip. lie held two press conferences on the two days before the assassination subtly attacking both Kennedy and Johnson and emphasizing the Democratic political problems in Texas. Source: Warren Commission Exhibits -- Vol. XXII, Pages 941-943 29 10. Research indicates that Nixon either knew in advance about the Cabal's plans, or learned about them soon after the assassination. Source: Trowbridge Ford, "Letter to House Commi ttee on the Judiciary," Holy Cross College, Worcester, Mass. June, 1974. 11. Nixon proposed to Lyndon Johnson that Gerald Ford serve on the Warren Commission. Source: Trowbridge Ford, "Letter to Judiciary Committee" 12. Ford led the Commission cover-up by controlling the questioning of key witnesses and by several other means. Source: Trowbridge Ford, Holy Cross College, Worcester, Mass. "Letter to Judiciary Committee" 13. Ford helped plant the idea that Oswald was the only assassin and that there was no conspiracy, firmly in the minds of the American public by publi shing HIS OWN BOOK, and ti tling it, "Lee Harvey Oswald -- Portrait of THE Assassin". Source: Ford's book, "Lee Harvey Oswald -- Portrait of The Assassin" 14. Ford purposefully covered up the conspiracy of the Cabal in the JFK assassination and also covered up the fact that Oswald was a paid informer for the FBI. He did this by dismissing the subject in his book as worthless rumor and by keeping the executive sessions of the Commission where Oswald's FBI informer status was discussed, classified Top Secret. Sources: Ford's book; The Assassination of President Kennedy -- Declassification of Relevant Documents from the National Archives; R. E. Sprague -- Computers & Automation, October, 1971' 15. Ford continued the cover-up of his assassination cover-up when he was questioned before being confirmed by the Senate as Vice President. He lied under oath two times to the Senate Committee, thus committing perjury. He stated that he had written his book about Oswald with no access to classified documents. He lied about this because his book used classified documents about Oswald's FBI informer status. He lied when he said that the book was titled, "Lee Harvey Oswald -- Portrait of an Assassin." This was significant in 1973 because the public by then had become very skeptical about a lone assassin. By changing one word in the title, Ford made the book seem a little less like what it actually was; an effort to make Oswald seem to be the lone assassin. Source: Ford's book; Ford's testimony before the Senate Committee. 16. Jaworski aided in the JFK cover-up by sitting on evidence of conspiracy accumulated by Waggoner Carr, Texas Attorney General, whom he represented in liaison with the Warren Commission. _ He also stopped the critical testimony of Jack Ruby when he was testifying before the Warren Commission, and diverted attention away from Ruby's intent to reveal the conspiracy to kill both Kennedy and Oswald. Sources: Dr. Tuteur, psychiatrist who interviewed Ruby in his jail cell. "Psychiatric Examination of Jack Ruby" Mental Health, April, 1974, Vol. 58 #2, Washington, D.C.; Trowbridge Ford, "Letter to the Judiciary Committee" 17. Nixon became President in 1968 only because Rdbert Kennedy was killed by a conspiracy, involving the Cabal and the CIA. Nixon was well aware of the conspiracy whether or not he approved of it in advance. Sources: Investigation by Wil30 liam Turner and John Christian and FBI Report on RFK assassination. 18. John Mitchell and J. Edgar Hoover, joined Nixon and the lower level members of the Cabal in covering up the RFK murder conspiracy. They classified the evidence Top Secret and murdered several witnesses, plus controlling the Judge in the Sirhan trial, the District Attorney and ihe Chief of Police in Los Angeles during and after the trial. They still control these people plus the Los Angeles County Board of Supervisors. Clarence Kelley is now also involved. Sources: Same as above, plus L.A. County Board Meeting minutes and Baxter Ward hearings. 19. With knowledge of Nixon and the Cabal, the plumbers group ordered the assassination of George Wallace in 1972, to insure Nixon's election by picking up Wallace's vote. (About 18%-in the polls). Source: Investigation by Committee to Investigate Assassinations and by William Turner, 1973-74. 20. J. Edgar Hoover and Richard Helms were aware of who killed John Kennedy and Robert Kennedy and helped cover-up both conspiracies. Sources: a. Richard E. Sprague, "RFK Articles on Conspiracy," Computers & Automation, Oct. 1970, Sept. 1972; b. Victor Marchettis's public statements -- December, 1973 -- about; c. Richard Helm's and Admiral Taylor's covering up Clay Shaws' CIA connections and paying his lawyers. 21. John Mitchell controlled the trial of Clay Shaw and the Garrison investigation and discredited Garrison by framing him in a New Orleans gambling case. Source: "The Framing of Jim Garrison," Richard E. Sprague, Computers & Automation, December, 1973. 22. Nixon and Haldeman discussed the assassination of John Kennedy, the conspiracy, Hunt's involvement, the possibility that Hunt might talk, the cover-up, the Bay of Pigs relationship between Nixon, Hunt and the other Cabal members, and the briefing Nixon might have to give anyone running against him in 1972, about these matters of "National Security." Source: Tape transcript -Nixon and Haldeman -- June 23, 1972. The majority of the tape was transcribed as being unintelligible. But Nixon mentions Hunt possibly revealing "Hanky Panky," that we were not involved in OURSELVES. He was referring to Haldeman, Nixon and Co. All of the actions so far revealed in Watergate would not fit that description. The assassinations of JFK, RFK, and Wallace were undoubtedly what Nixon was talking about. Nixon also says to Haldeman when discussing Hunt and Watergate and the other Watergate men, "It all goes back to the Bay of Pigs, you know." Then several "unintelligible" statements appear in Nixon's edited transcript. Finally, Nixon tells Haldeman he may have to "burden" the Democratic candidate, whoever it may be, by briefing him on those matters of "National Security" on which he was briefed by Johnson. The context in which thi s appears, surrounded by "unintelligible" remarks, indicates Nixon was talking about matters which would be very embarrassing and would have to be kept secret at all .costs. This is the tape that was probably edited and erased partly by Nixon and Haig. COMPUTERS and PEOPLE for January, HI7S 23. Nixon and Mitchell discussed the assassinations and the attempt to assassinate George Wallace. These discussions probably occurred mostly on Nixon's Potomac yacht, but some could be on the tapes. Mitchell executed orders to suppress the truth about these events. Source: a. Article by Martha Mitchell, McCall's magazine, September, 197~, with Mrs. George Wallace, discussing Nixon and plumbers hiring Arthur Bremer; b. Public statements by Martha Mitchell to Helen Scott, U.P.I., Spring, 1973, concerning conversations Nixon and Mitchell had on Nixon's yacht, about dirty things. 24. Gerald Ford now has possession of the most critical tapes when assassinations and cover-up were discussed. He will not let go of them or he will give them to Nixon. Source: News stories about White House keeping the Nixon tapes, August and September, 1974. 25. Jaworski can be counted on to keep the assassination material under wraps even after his resignation. He is already well aware of the evidence of conspiracy and cover-up in all three cases. (JFK, RFK, Wallace). Source: Discussions and meetings between this author and Watergate Senate Committee staff. Assassination evidence has been in Ervin Committee and Jaworski's possession since the summer of 1973. The fact that Jaworski has not introduced any of it is indicative that it will remain secret. His resignation would seem to be connected in some way with the "deal" between Nixon and Ford. It remains to be seen whether Henry Ruth, the new Prosecutor, can be controlled in the same manner. 26. Hunt has been taken care of and will keep silent. He is out of jail and living on a beautiful $100,000 estate in Florida with plenty of money, across the street from his Bay of Pigs friend, Manuel Artime. Source: Washington Watch newsletter, and correspondence from Tristram Coffin -- August 10, 1974. 27. Clay Shaw was murdered by the Cabal, undoubtedly to keep him from talking, now that the truth about his CIA position has been revealed by Victor Marchetti. He was embalmed quickly before the coroner could determine the cause of death. Evidence indicates he was killed somewhere else and then brought to his own apartment where he was found dead. Source:' New Orleans County Coroner's statement and eye-witnesses who were Shaw's neighbors. Zodiac News Service, August, 1974. 28. Hale Boggs, Warren Commission member was possibly killed by the Cabal. Boggs' airplane disappeared in Alaska. No trace of it was ever found and no explanation of how the plane could have crashed has ever been given. Mrs. Boggs has expressed doubts about it being an accident. Source: News Stories -- 1972-73. 29. Four of the seven Warren Commission members have died: Warren, Dulles, Russell and Boggs. Of the remaining members, Ford is President, John J. McCloy is retired and living in Connecticut and John Sherman Cooper is the new Ambassador to East Germany. 31. Haldeman erased 18-1/2 minutes of a taped discussion with Nixon. This tape undoubtedly contained "National Security" matters. The fact that Haldeman did the erasing can easily be determined by tracing the trail of possession of the tape from the day it was taken out of the vault to the day the gap was discovered. Haldeman had the tape with the recorder alone for nearly 48 hours. No one else, including Nixon, had the tape alone long enough to do the erasing. 32. Ford and the "inner circle" contemplated pardons for Mitchell, Haldeman, Ehrlichman and possibly others who know the number one secret. Source: News Stories September 9-11, 1974. After public and private outcries stopped this maneuver by Ford, alternate arrangements will have to be made to keep them all quiet. 33. Ford's statements to the sub-committee of the House Judiciary Committee concerning his pardon of Nixon dodged the real issue. Only Elizabeth Holtzman asked questions coming close to the ~l secret. When she asked about a prior agreement, Ford said, "I have made no deal, there was no deal, since I became Vice President." Those last few words were not reported by the press, but a large number of Americans watched and heard him say them. Of course he spoke truthfully because the "deal" was made BEFORE he became Vice President. Footnotes 1. Evans & Novak column -- September 12, 1974 2. Paris Herald Tribune -- September 12, 1974 3. "Compulsive Spy," Tad Szulc, Viking Press, 1974 ~. "Nixon and the Mafia," Jeff Gerth, Sundance, December. 1972. 5. "Six Crises", Richard M. Nixon 6. "Compulsive Spy" 7. "Nixon and the Mafia" 8. "Nixon, Bay of Pigs & Watergate" -- R. E. Sprague, Computers and Automation, January, 1973 9. "Nixon, Bay of Pigs & Watergate" -- R. E. Sprague, Computers and Automation, January, 1973 10. Trowbridge Ford, Holy Cross College, several papers and articles 11. Warren Commission Hearings & Exhibits -- Vol. 23, Pages 941-943 12. Nixon Transcript of June 23, 1972, tape -- N.Y. Times, Aug. 6, 1974 13. Trowbridge Ford -- Article on Gerald Ford & Warren Commission 14. Trowbridge Ford -- Artiale on Gerald Ford & Warren Commission 15. Gerald Ford -- "Lee Harvey Oswald Portrait of the Assassin" 16. "The Framing of Jim Garrison," R. E. Sprague, Computers and Automation, December, 1973 17. "The CIA and the Kennedy Assassination" -- Unpublished article by R. E. Sprague 18. Nixon tape, June 23, 1972 19. Warren Commission Exhibits -- Testimony of Jack Ruby, Vol. V, Pages 181-213 and Vol. XIV, Pages 504-571. Also Trowbridge Ford article on Jaworski 20. Washington Watch and Triss Coffin letter, August 10, 1974 21. Zodiac News Service release ~- August 20, 1974 30. Richard Russell, Hale Boggs and Cooper believed there was a conspiracy in the JFK assassination. Russell and Boggs both said so publicly. They are dead. Cooper has said so privately. COMPUTERS and PEOPLE for January. 1975 31 GAMES AND PUZZLES for Nimble Minds and Computers Neil Macdonald Assistant Editor It is fun to use one's mind, and it is fun to use the artificial mind of a computer. We publish here a variety of puzzles and problems, related in one way or another to computer game playing and computer puzzle solving, or to the programming of a computer to understand and use free and unconstrained natural language. We hope these puzzles will entertain and challenge the readers of Computers and People. ' SIXWORDO NUMBLES In this puzzle, the problem is to paraphrase a passage (a series of connected sentences) making every new sentence no longer than six words, the meaning to be just the same. According to the dictionary, to paraphrase means to restate a text or passage giving the meaning in another form; in this case there is no requirement to change or alter any word - only the requirement of producing sentences no longer than six words. Usually, the number of sentences in th~ paraphrase is 4 or 5 times the number of sentences in the original passage. A "numb Ie" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns, or deliberate (but evident) misspellings, or is otherwise irregular, to discourage cryptanalytic methods of deciphering. SIXWORDO PUZZLE 751 Within anyone context, the problem of designating ideas is relatively easy. Most ideas are tagged with singlemeaning words. Ideas are then made clear and definite, and we reach the happy state in which we can readily calculate with idea-labels. In the game of chess, for example, the following words all have a neat one-to-one correspondence with ideas: "king, queen, bishop, rook, knight, pawn, black, white, board, square .... " In fact, the list of special words belonging to chess is only 30 to 40 terms long. The words belonging specifically to a given context can conveniently be called "brick-words"; and the remaining words which can be used in a great many contexts and which put brick-words together can conveniently be called "cement-words". (Hint: One solution uses 27 sentences.) NUMBLE 751 THE + P 0 0 R R T H I + FEE D E 0 P 64438 124 MAXIMDIJ In this kind of p~zzle, a maxim (common saying, proverb, some good advice, etc.) using 14 or fewer different letters is enciphered (using a simple substitution cipher) into the 10 decimal digits or equivalent signs for them. To compress any extra letters into the 10 digits, the encipherer may use puns, minor misspellings, equivalents like CSor KS for X or vice versa, etc. But the spaces between words are kept. MAXIMDIJ .PUZZLE 751 +0 32 NAYMANDIJ In this kind of puzzle an array of random or pseudorandom digits ("produced by Nature") has been subjected to a "definite systematic operation" ("chosen by Nature") and the problem ("which Man is faced with") is to figure out what was that operation. A "definite systematic operation" meets the following requirements: the operation must be performed on all the digits of a definite class which can be designated; the result displays some kind of evident, systematic, rational order and COMPUTERS and PEOPLE for January, 1975 - completely removes some kind of randomness; the operation must be expressible in not more than four English words. (But Man can use more words to express it and still win.) mation G I ZZMO The puzzle is to grasp relations between things that are not identified in the usual way - their names cannot be looked up in a dictionary - and then solve a problem involving them. NA YMANDIJ 751 GIZZMO 751 ~] ~] 5 964 260 236 1 7 0 8 7 986 1 7 8 5 441 496 6 3 9 871 2 8 4 7 2 7 2 4 2 5 8 878 9 6 9 0 9 0 2 0 8 4 0 3 8 2 8 0 4 9 9 1 9 5 5 9 6 206 650 9 6 622 381 928 0 1 2 3 4 4 2 7 6 6 578 234 077 1 324 9 8 0 9 4 2 6 4 3 6 1 2 2 2 4 5 3 29 8 4 2 7 6 4 9 8 693 2 3 204 2 2 0 3 9 8 840 891 798 9 3 6 2 9 295 605 6 3 687 3 5 9 5 2 7 6 2 2 8 5 5 9 8 4 -1 6 6 2 0 8 ~] ALGORITHMO In this puzzle, the objective is to express a procedure for going in a given situation from given input to given output. The following conditions apply: the situation is a little off the beaten path and is interesting; the procedure is fairly evident and fairly short; the procedure is to be expressed in precise English words, with perhaps defined terms in addition; the procedure is to be completely and accurately expressed, i.e., the calculating procedure must work. For the following puzzle, we hope to publish in the March issue the best solution received before Feb. 10 from a reader of Computers and People. While we believe that there are reasonable limits to what the HONTEMS of FLEENS should be in their entirety and to what an individual FLEEN should seek to encompass by way of a variety of HONTEMS, we do not consider these limits to be either crystal clear or uniformly applicable to any and all FLEENS. Many HONTEMS can improve FLEENS; certain contrasting HONTEMS in the same FLEEN can make the FLEEN both more interesting to its participants and more vital in its HONTEMS because some conflicts in points of view and methodology can be highly productive. The multipurpose FLEEN can be more exciting than the single-purpose l~LEEN. However, we urge adoption of the many golden mean solutions between the extreme of the all-purpose FLEEN and the single-purpose FLEEN. Our caution is that a FLEEN can do too much as well as too little. What is a HONTEM? What is a FLEEN? (Hints: 1. This puzzle is derived from a famous report by a famous foundation. 2. But there may be more than one solution.) We invite our readers to send us solutions. Usually the (or "a") solution is published in the next issue. SOLUTIONS MAXIMDIJ 7412: Even one enemy is too many. NUMBLE 7412: The heart has also ears. GIZZMO 7412: GOND: superstitious belief; ALUN: activity; ENGAD: object. NAYMANDIJ 7412: Make row 2 even. ALGORITHMO 751 ] Problem: State a procedure for going from a given number N to the minimum number M of tetrahedral numbers which added together will equal N. Also, state the solutions. Input: A number N from 1 to 1000. Output: (1) The minimum number M. (2) The solutions for M. Example: For N equal to 16, the minimum number M is 4. There are two solutions for 16: 10 + 4 + 1 + 1 ; 4 + 4 + 4 + 4. Definition: The tetrahedral numbers are numbers of the form k(k+ l)(k+2)/6, where k is a positive integer. The first six tetrahedral numbers are 1, 4, 10, 20, 35, 56, .... A tetrahedral number is so named because it counts the number of round balls composing a solid tetrahedron of round balls. COMPUTERS and PEOPLE for January, 1975 6 7 164 2 4 5 4 6 7 9 1 2 9 3 7 2 9 2 2 8 0 8 9 3 3 3 9 9 6 8 1 0 0 0 9 0 0 4 3 6 4 6 4 2 9 6 0 4 604 0 886 8 0 4 8 8 6 6 3 840 6 9 741 444 901 5 8 5 2 7 0 3 2 2 7 3 6 8 8 2 267 3 8 7 554 7 7 3 4 789 9 8 7 6 0 5 5 9 1 001 454 869 2 5 7 0 601 154 1 8 1 6 8 232 399 7 3 664 259 1 000 334 8 8 7 6 1 4 8 8 5 4 957 7 2 255 7 0 4 9 5 566 1 084 4 8 7 946 I Our thanks to the following individuals for sending us their solutions to - NUMBLE 7411: Abraham Schwartz, Jamaica, NY. 33 Computing and Data Processing Newsletter CAMBRIDGE MASS. USES COMPUTER TO FOIL SCHOOL VANDALS Incidents of vandalism in Cambridge schools have dropped dramatically this year, according to Oliver Brown, assistant superintendent of schools. "The combined efforts of the School Committee, police .. ci ty electricians, parents and residents have reduced damage costs from $3700 a month to $335 a month since the beginning of the year," said Brown. A l2-point plan initiated last fall brought about a decrease from 37 incidents a month to about seven, Brown said. Police also said that a man who bought stolen school goods, then attempted to sell them back to the School Department, was recently apprehended. BRAILLE COMPUTER TERMINAL DEVELOPED IN AUSTRALIA John Coleman Australian Information Service 636 Fifth Ave. New York, N. Y. 10020 A device which enables blind people to read information provided by a computer has been developed in Melbourne, Australia. Mr. Tony Brown, 29, a blind electrical engineering graduate of Monash University in Melbourne and a member of the university staff since 1971, has developed the braille printing device to supplement the teletype machine which is normally used by computer operators to give instructions to and receive information from a computer. Each article of school equipment is now stenciled in code. The vandalism has been computerized with each incident recorded, including all details, to ~how a pattern which police can follow up. Date, time, place, how entrance was gained, the nature of the incident, and the cost of the loss are noted in the computer banks. Through this method, school and police officials analyze where vandalism occurs and where vandals might strike again. Parents, teachers and residents are made aware of the sites of frequent vandalism, and they give valuable assistance. Electronic surveillance equipment has been installed in schools where vandalism occurs most frequently. Police cruisers respond to school alarms in "one to three minutes," Brown said. In another phase of the plan, locks in school buildings have been changed to make illegal entry by keys almost impossible. As an added incentive, $1 for each student in each school has been set aside to pay for vandalism in addition to the normal educational funds. Money not used for vandalism due to its decline may be used by each individual school for educational, recreational or aesthetic projects, Brown said. Vandalism cost the Cambridge School Department $34,123 for the first nine months, but many of the thefts and much of the damage occurred before the new plan was implemented. 34 The machine consists of a standard teletype terminal with keyboard and print-out facilities, a braille typewriter which has been converted to automatic operation, and a mini-computer which receives information from the main computer, stores it and then converts it to a form which can be printed on the braille typewriter. The same information is also relayed to the standard teletype terminal printer. The terminal was developed over the past two years as a part-time project by Mr. Brown in conjunction with the computer centre's director, Dr. Cli ff Bellamy. It was financed by a $A7500 grant from the William Buckland Foundation. Mr. Brown, who has been blind since he was 18, said that other systems of braille computer printouts had been devised such as using only the periods COMPUTERS and PEOPLE for January. 1975 on a standard printer; but that these tended to be difficult to program and to read. The new terminal designed and built by the computer centre combines great flexibility with high quality of output. The prototype model will undergo some refinement and then it will be tested by other blind computer programmers and with other computers. Consultants' fees depend on the size of the school system and the extent of services required by the school committee. Among the consultants which offer computerized bus routing are: LKB Systems of Syosset, NoY.; Programmed Transportation of Penfield, N.Y.; Westinghouse Learning Corp., of Waltham; and Educational Coordinates, of Princeton, N.J. Leo P. Turo, director of the state Board of Education's school management services, is skeptical about paying private consultants for bus scheduling. THREE COMMUNITIES IN MASSACHUSETTS MAKE SAVINGS WITH COMPUTERIZED SCHOOL-BUS ROUTES Massachusetts school transportation costs, which last year topped $55 million, have been forced sharply upward this year by inflationary pressures -- such as higher vehicle cost~ increased oil prices and rising bus drivers' salaries -- not to mention extra court-ordered busing in Boston and Springfield. But computerized bus routing has chopped more than $100,000 from 1974 school transportation budgets in Braintree, Brockton and Taunton. School officials in those communities hired consultants to survey local traffic patterns, locations of students' homes and school destinations, then developed plans for more efficient use of school buses. "The consultants did everything we asked and more," said Taunton School Supt. Edward Aleixo. Aleixo said 57 buses formerly were used to cover 87 routes in the city. Now there are nine more routes but only 33 buses. Taunton's savings may have been augmented by competition among four bus companies for a share of the contract. Each route was bid separately. Long said the consultants proposed several alternate busing programs for Brockton. "We decided not to adopt staggered school closing hours," Long said, "but wi th more efficient scheduling we cut our transportation budget about 8 percent last year." In Taunton, the cutback in the number of buses required adjustment of school starting times. The high school classes start at 8 a.m., middle school at 8:30 and elementary grades at 9. In these and other communities with recently revamped schedules, school officials report there were some parental complaints during the early weeks of school. Longer bus routes or double bus trips forced some students to leave home earlier than in past years. Younger children on an early bus may tire more easily than older students, and they need extra supervision if they arrive at school 20 minutes or more before classes begin. Turo said his office assists public schools with scheduling, contracts, safety and other busing problems -- all without cost to the school system. Hull School Supt. Richard Charlton said Turo's department helped his community write specifications for its transportation contract but did not restructure bus routes. Some school officials reject use of consultants, contending that local school bus coordinators know their community and its transportation problems better than any outside consultant could in a few weeks. One school official disagreed. "I don't think we could have done as well by ourselves." Brockton's Girard Long said: "Most routes were set up years ago and only changed when buses became overcrowded. No one in the school department has time to plot the location of every student's home. If some company is equipped to do this and can save us money, why not take advantage of it?" MANY RADIO MUSIC STATIONS ARE RUN BY COMPUTER A current development is the automated radio station run by computer. According to Broadcast Magazine, more than half the FM radio stations in the country are now completely automated, with more scheduled to take that route in the near future. This magazine also reports that automation is making gradual inroads in the AM market. Here's how a system works. A station hires a programming company and tells it what type of format is desired -- adult rock, beautiful music, top40, etc. The programming company then chooses the actual music to be played and the order the songs are to be played in, based on what has been successful for other stations with the same format. The songs are taped and sent to the station, where they are simply put into the computer and played one after another automatically. At some stations, even the commercials are taped beforehand. Then all a station has to do is to keypunch an order to the computer telling it when to use a certain commercial. It's done without a single human being ever having to touch the tape. As more children are assigned to each bus, dis~ ciplinary problems may increase, and safety analysts may become concerned about standees. One general manager stressed cost as a major advantage of the automated systems. "One or two announcers to tape your commercials, a couple of people to be with the computer 24 hours a day, and there's your broadcasting staff." "If you're going to save this much money, something has got to give somewhere," said Braintree's School Committee chairman, Mrs. John Grabosky, who added that Braintree's busing costs dropped from $368,000 in 1973 to approximately $253,600 this year. To people who complain that an automated station has a "canned" sound, he replies, "These days the computers are so sophisticated that unless wo toll people we're automated, they'd never know." COMPUTERS and PEOPLE for January, 1975 35 The 6th cumulative edition of ttWHO'S ·WHO IN COMPUTERS AND DATA PROCESSING" is due to be published in 1975 • Send us your order at the special prepublication price of $34.50 (Price after publication will be $40.00) \ .. :, "Who's Who in Computers and Data Processing" is jointly published by Quadrangle/The New York Times Book Co. and "Computers and People" (Berkeley Enterprises Inc.) The most essential components in computers and data processing are PEOPLE - who are they? what do they do? where do they do it? ~ .. "Who's Who in Computers and Data Processing" is particularly useful for: Personnel managers Libraries Conference planners Directors of computer installations Suppliers to the computer industry Executive search organizations Prospective authors Prospective speakers ... anyone who needs to keep up with the important people in the field. This publication is based on "never ceasing" data gathering about computer professionals carried out for more than 10 years by "Computers and People" (formerly "Computers and Automation"). Our files contain information on more than 17,000 computer professionals. 1- - - - - - - (may be copied on any piece of paper)- - - - - - - - WHO'S WHO IN COMPUTERS AND DATA PROCESSING 815 Washington St., Newtonville, Mass. 02160 I - - - _. I YES, please enroll me as a subscriber to Who's Who in Computers and Data Processing as follows: I enclose $34.50 prepublication price for the 1975 cumulative "Who's Who" when published. I can't wait for a number of months. Please send me the last cumulative edition, and 3 updating supplements. I enclose $34.50. Each computer professional has a capsule biography detailing: last name; first name and middle initial (if any); occupation; year of birth; university education and degrees; year entered the computer field; main interests; job title; organization and its address; publications, honors and memberships; home address. Both. I enclose $69.00. RETURNABLE IN 10 DAYS FOR FULL REFUND IF NOT SATISFACTORY Name _________________________________________ We are confident that you will find the subscription will repay you many times over. In fact, one day when this wealth of material gives you the inside track with someone important to you, you'll find the information PRICELESS: the most essential component in EDP is CAPABLE PEOPLE. Tit I e-_________________________________________ Organization ___________________________________ Address _______________________________________ City_______________ State & Zip, ________________ Your Signature P.O. No. _ __ (if company order) SI
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:25 02:46:25-07:00 Create Date : 2009:03:25 02:46:25-07:00 Metadata Date : 2009:03:25 02:46:25-07:00 Format : application/pdf Document ID : uuid:7d2856d4-a2bb-4117-878d-32ae6ace2957 Instance ID : uuid:77709046-0395-43bf-a9f3-07a07d45c9c8 Page Layout : SinglePage Page Mode : UseNone Page Count : 36EXIF Metadata provided by EXIF.tools