197512
197512 197512
User Manual: 197512
Open the PDF directly: View PDF .
Page Count: 28
Download | |
Open PDF In Browser | View PDF |
I SCIENCE AND BUS~NESS computers and people ' December, 1975 Vol. 24, No. 12 formerly Computers and Automation UB~y USE ONt y 225 CHRISTMAS FLOWERS by William Kolomyjec The Computer Glass Box (Part 2) The Universal Product Code Software Should Be Patentable Computer-Assisted Tutorials in College Mathematics Computers and Society: A Course at York University - H. A. Peelle Thomas V. Sobczak ADAPSO J. L. Caldwell and Doug/as Polley Larry J. Murphy 7 3 "RIDE THE EAST WIND: Parables of Yesterday and Today" by Edmund C. Berkeley, Author and Anthologist Published by Quadrangle/The New York Times Book Co., 1974, 224 pp, $6.95 Missile Alarm from Grunelandt The Fly, the Spider, and the Hornet Once a Fly, a Spider, and a Hornet were trapped inside a window .screen in an attic. For several hours they walked up and down, left and right, here and there, all over the screen. They could look through the screen at the summer woods, feel the summer breezes, and smell the summer smells; but they could not find any hole to pass through the screen to the woods and fields so tantalizingly close, yet so far away. Finally they decided to hold a conference on the problem of getting through the screen. The Fly spoke first, and said, "My Colleagues, .... The Fox of Mt. Etna and the Grapes Once there was a Fox who lived on the lower slopes of Mt. Etna, the great volcano in Sicily. These slopes are extremely fertile; the grapes that grow there may well be the most delicious in the world; and of all the farmers there, Farmer Mario was probably the best. And this Fox longed and longed for some of Farmer Mario's grapes. But they grew very high on arbors, and all the arbors were inside a vineyard with high walls, and the Fox had a problem. Of course, the Fox of Mt. Etna had utterly no use for his famous ancestor, who leaping for grapes that he could not reach, called them sour, and went away. The Fox decided that what he needed was Engineering Technology. So he went to a retired Engineer who lived on the slopes of Mt. Etna, because he liked the balmy climate and the view of the Mediterranean Sea and the excitement of watching his instruments that measured the degree of sleeping or waking of Mt. Etna. The Fox put his problem before the Engineer .... The Fire Squ irrels Scene: Two squirrels, a young one named Quo, and an older one named era-era, are sitting by a small campfire in a field at the edge of a wood. Behind them hung on a low branch of a tree are two squirrel-size hammocks. Over each of the hammocks is a small canopy that can be lowered to keep out biting insects. It is a pleasant summer evening,' the sun has just recently set, and the stars are coming out:-Quo: Cra-Cra, you know I don't believe the old myths any more. Tell me again how it really happened. era-era: Just this: we received our chance because they dropped theirs. It is as simple as that. Quo: In other words, they were the first animals to use tools, and we are the second? era-era: Yes. There is a mode of surviving in the world .... 2 Once upon a time there were two very large and strong countries called Bazunia and Vossnia. There were many great, important, and powerful leaders of Bazunia who carefully cultivated an enormous fear of Vossnia. Over and over again these important and powerful leaders of Bazunia would say to their fellow countrymen, "You can't trust the Vossnians." And in Vossnia there was a group of great, important, and powerful leaders who pointed out what dangerous military activities the Bazunians were carrvinQ on, and how Vossnia had to be militarily strong to counteract them. The Bazunian leaders persuaded their countrymen to vote to give them enormous sums of money to construct something called the Ballistic Missile Early Warning System, and one of its stations was installed in a land called Grunelandt far to the north of Bazunia. Now of course ballistic missiles with nuclear explosives can fly any kind of a path all around a spherical world, and they do not have to fly over northern regions. But this kind of reasoning had no influence on the leaders of Bazunia who wanted the money for building BMEWS. Nor did it have influence on their countrymen, who were always busy, trying to make money - in fact often too busy to think clearly .... 52 parables (including fables, anecdotes, allegories) 23 never published before 27 authors 18 full-page illustrations 330 quotations and maxims 7 Parts: The Condition of Man / On Flattery and Persuasion / On Perseverance and Resourcefulness / Behavior - Moral and Otherwise / The Problem of Truth / On Common Sense / Problem Solving THE VALUE OF THIS BOOK TO YOU CAN BE VERY GREAT JUDGE FOR YOURSELF AT NO COST RETURNABLE IN 10 DAYS FOR FULL REFUND IF NOT SATISFACTORY You can read it all in 10 days - and keep it only if you think it is worth keeping. HOW CAN YOU LOSE? - - - - (may be copied on any piece of paper) - - - - - - - I I To: Berkeley Enterprises, Inc. 815 Washington St., S9, Newtonville, MA 02160 Please send me copy(jes) of Ride the East Wind: I enclose $7.00 per copy (includes handling). Total enclosed _ _ _ __ (Prepayment is necessary) My name and address are attached. COMPUTERS and PEOPLE for December, 1975 The 6th cumulative edition of ttWHO'S WHO IN COMPUTERS AND DATA PROCESSING" is due to be published in 1976 • Send us your order at the special prepublication price of $34.50 (Price after publication will be $40.00) "Who's Who in Computers and Data Processing" is jointly published by Quadrangle/The New York Times Book Co. and "Computers and People" (Berkeley Enterprises Inc.) The most essential components in computers and data processing are PEOPLE - who are they? what do they do? where do they do it? "Who's Who in Computers and Data Processing" is particularly useful for: Personnel managers Libraries Conference planners Directors of computer installations Suppliers to the computer industry Executive search organizations Prospective authors Prospective speakers ... .... This publication is based on "never ceasing" data gathering about computer professionals carried out for more than 10 years by "Computers and People" (formerly "Computers and Automation"). Our files contain information on more than 17,000 computer professionals. r - - - - - - - (may be copied on any piece of paper)- - - - '- - - - - - - I WHO'S WHO IN COMPUTERS AND DATA PROCESSING 815 Washington St., Newtonville, Mass. 02160 YES, please enroll me as a subscriber to Who's Who in Computers and Data Processing as follows: I enclose $34.50 prepublication price for the 1976 cumulative "Who's Who" when published. anyone who needs to keep up with the important people in the field. I can't wait for a number of months. Please send me the last cumulative edition, and 3 updating supplements. I enclose $34.50. Each computer professional has a capsule biography detailing: last name; first name and middle initial (if any); occupation; year of birth; university education and degrees; year entered the computer field; main interests; job title; organization and its address; pub· lications, honors and memberships; home address. Both. I enclose $69.00. RETURNABLE IN 10 DAYS FOR FULL REFUND IF NOT SATISFACTORY Name_______________________________________ We are confident that you will find the subscription will repay you many times over. In fact, one day when this wealth of material gives you the inside track with someone important to you, you'll find the information PRICELESS: the most essential component in EDP is CAPABLE PEOPLE. COMPUTERS and PEOPLE for December, 1975 Tit I e_______________________________________ Organization ________________________________ Address, ____________________________________ City_______________ State & Zip _ _ _ _ _ _ _ __ Your Signature P.O. No. _ __ (if company order) 3 Vol. 24, No. 12 December, 1975 Editor and Publisher and people formerly Computers and Automation Edmund C. Berkeley Computer-Readable Marking and Consumers Assistant to Judith P. Callahan the Publisher Assistant Editors Barbara L. Chaffee Neil Macdonald Art Editor Grace C. Hertlein Software Editor Stewart B. Nelson Contributing Editors John Bennett John W. Carr III Grace C. Hertlein Linda Ladd Lovett Ted Schoeters Richard E. Sprague Edward A. Tomeski Thomas Land London Correspondent Advisory Committee Ed Burnett James J. Cryan Editorial Offices Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 617-332-5453 Advertising Contact The Publisher Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 617-332-5453 "Computers and People," formerly "Computers and Automation," is published monthly, 12 issues per year, at 815 Washington St., Newtonville, MA 02160, by Berkeley Enterprises, I nco Printed in U.S.A. Second Class Postage paid at Boston, MA, and additional mailing points. Subscription rates: United States, $11.50 for one year, $22.00 for two years. Canada: add $1 a year; elsewhere, add $6 a year. NOTE: The above rates do not include our publication "The Computer Directory and Buyers' Guide". If you elect to receive "The Computer Directory and Buyers' Guide," please add $12.00 per year to yo~r subscription rate in U.S. and Canada. and $15.00 elsewhere. Please address mall to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160. . Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160. © Copyright 1975, by Berkeley Enterprises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it appears on the magazine address imprint), and allow three weeks for the change to be made. 4 computers [A] 7 The Universal Product Code: An Introduction to What It Means for Consumers by Thomas V. Sobczak, Ph.D., Long Island City, NY 11101 What the new code marking on grocery store products means and how it is likely to affect customers, who will no longer have readable prices marked on the products. The Computer Industry 14 Software Should Be Patentable by ADAPSO (Association of Data Processing Services/ Software Industry Association), Philadelphia, PA A vigorous argument full of cogent reasons why computer programs should be patentable. [A] 10 Images and Reality in the Computer Field - A Discussion by the Editor and Jack Biddle, President, Computer Industry Association, Rosslyn, Va. Some of the things that I BM appears to do and actually does - in advertising, standards setting, entry into the computer peripherals market, and so on. [F] Computers and Education 22 Computer-Assisted Tutorials in College Mathematics by J. L. Caldwell, Dept. of Mathematics, University of Wisconsin- River Falls, River Falls, WI, and Douglas Polley, Dept. of Mathematics, University of Minnesota, Minneapolis, MN How to apply a computer in a way that spots the plausible mistakes that students make, and then provides specific instruction that removes that class of mistake. [A] 17 The Computer "Glass Box": Teaching with APL (Iverson's "A Programming Language") - Part II by Howard.A. Peelle, Director, Instructional Applications of Computers, University of Massachusetts, Amherst, Mass. A black box that you can see into and can see how it works becomes a "glass box"; and this article describes how a true innovator in computer education is making algorithms and programming transparent to his students. [A] 26 Promoting the Use of a Computer in Teaching by News Service, The University of Iowa, Iowa City, IA [N] "', COMPUTERS and PEOPLE for December, 1975 The magazine of the design, applications, and implications of information processing systems - and the pursuit of truth in input, output, and processing, for the benefit of people. Computer Graphics and Art 10 "Computer Graphics and Art" - Open Letter by Grace C. Hertlein, Editor The first issue of this new quarterly is expected to be published in February, 1976; and who are the contributing editors and advisory board. [F] 28 "Computer Graphics and Art" Announcement [F] Front Cover Picture "225 Christmas Flowers" is by William Kolomyjec, Instructor in the College of Engineering, Michigan State University, East Lansing, Michigan. It was drawn on a Ca IComp plotter driven by an IBM 1800, at the computer research facility of the College of Engineering. Announcements "Who's Who in Computers and Data Processing": Computer Applications 24 Computer "Scenarios" for the Application of Pesticides Before They Are Applied by Robert Silber, Michigan State University, East Lansing, MI [N] 24 Computer Monitors Prescriptions and Helps Prevent Adverse Drug Reactions by Ken F leming, Group Health Cooperative of Puget Sound, Seattle, WA [N] 25 Minicomputer Helps Cut University's Electric Bills by John Kane, Hewlett Packard, Palo Alto, CA [N] 3 13 2 [A] 6 The Potential Understanding of Words by a Computer by Edmund C. Berkeley, Editor How computers may and do understand words, and where such understanding may lead in the future. 26 Notice "The Computer Directory and Buyers' Guide", 21 st annual edition, 1975: [A] Should be off press in December, 1975 - the delay is regretted. Key Computers and the Understanding of Ordinary Language ." Notice Statement of Circulation and Ownership: Computers and Society 11 Computers and Society: A Course at York University by Larry J. Murphy, Atkinson College, York University, Downsview, Ontario, Canada The philosophy, the course outlines, and the references for a successful course in computers and society taught for seven years in a Canadian university. Entry Form "Ride the East Wind: Parables of Yesterday and Today": Computers and Human Reiatiol1s 21 Computers and People: Case 1 - "Stuart University" by Dr. Edward A. Tomeski, Contributing Editor, "Computers and People", Fordham University, Bronx, NY How should "Stuart University", with given conditions and data, solve a set of problems about the use and applications of its computer? Notice [E] [A] [C] [E] [F] [N] [R] Article Monthly Column Editorial Forum Newsletter Reference Computers, Puzzles, and Games 27 Games and Puzzles for Nimble Minds - and Computers [C] by Neil Macdonald, Assistant Editor NAYMANDIJ - A systematic pattern among randomness? NUMBLES - Deciphering unknown digits from arithmetical relations. MAXIMDIJ - Guessing a maxim expressed in digits. COMPUTERS and PEOPLE for December, 1975 NOTICE *0 ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COMPUTER DIRECTORY. 5 EDITORIAL The Potential Understanding of Words by a Computer There is no doubt that a computer can understand words -- especially if we stipulate as conditions "some words" and "some contexts". If I type into a computer with an appropriate program the fivelettered word "three", the computer can translate that both into the more customary "3" and the machine language for 3, and it can respond appropriately, as for example, by doing something three times, thus demonstrating at least some understanding. Evidence of successful communication js evidence of understandi ng. When a computer program displays on a screen "Do you want to make any correction? (Yes, No)" and you then type in "No", the computer understands: it now accepts data previously labeled "Tentative", the item of knowledge that you do not want to make any correction; and the computer proceeds with the next step of its operations. There is no doubt that you can play the game of Twenty Questions with a computer if it has an appropriate program inside of it, to respond to the "Yes" or "No" answers that you give it. For example, you can say to a computer that is appropriately programmed, "I am thinking of a number -- can you guess it?" The computer can then say, "Is it less than a million?"; and as soon as you are committed to answering "Yes" or "No" to appropriate questions that will pin the number down, the computer has won the game. If you tell a computer "3 BUZZ 2 BANG 6" and "4 BUZZ 8 BANG 32", a computer with an appropriate program can promptly guess that BUZZ stands for TIMES and BANG stands for EQUALS. Suppose you want to edit a computer program using a certain common type of on-line editor, and 14 is the line number of the line that needs correction. You can type 14L, for example, standing for "line 14, display", and line 14 is displayed in front of you. Then you type 14C. standing for "line 14, change"; the computer shifts from command mode into text mode; you retype the line with corrections: and when you press the appropriate keys. the computer returns from text mode to command mode. Then if you type 14L once more, the line will be displayed again in front of you. and you can satisfy yourself that the line as retyped is correct. (If not correct, repeat the process once more.) More and more and more, the computer appropriately programmed will understand words in contexts; and eventually active. purposeful. and broad conversation with the computer will take place. In several 6 contexts this facility is already arriving: Diagnosis of disease, by conversational interaction between a doctor and the computer .. Taking of the medical history of a patient, by conversational interaction between a patient and the computer; Learning of a subject, by conversational interaction between a student and a computer program, as in computer-assisted instruction or computer-m~naged instruction. In this issue, we publish one more article along this road to a land of riches: "Computer-Assisted Tutorials in College Mathematics" by J. L. Caldwell and Douglas Polley. The authors explore typical student mistakes in solving mathematical problems, diagnose the mistake. and then help the student correct precisely the mistake which he has made. We can even imagine a time when one of the most interesting and congenial persons you can talk to is ~n appropriately programmed computer. It will know what you want to know. It will never be boring. It likes questions. It is unfailingly polite, patient, sympathetic. courteous, friendly, and tact· ful; it is programmed to be gently encouraging. If the computer is not quite sure what you mean, it will ask questions until it "knows" what you mean. If you say "Don't overload my mind by telling me more than I can remember," then its replies to you will be condensed, and convey only the most important facts. It might even say "If you know these 5 things about the Bering Sea, then you know enough to begin with," or "If you know these 8 things about the Russian conquest of the Caucasus in the 1800's, then you know more than 10,000 people taken at random know." The computer technology and the programming technology all exist. The selection of knowledge to be stored in the computer memory is a vast field for research and development -- and this field will it is hoped be cultivated well in the next twenty years. Edmund C. Berkeley Editor COMPUTERS and PEOPLE for December, 1975 ., The Universal Product Code: An Introduction to What It Means for Consumers Thomas V. Sobczak, Ph.D. Long Island City, NY 11101 "With the Universal Product Code, you pay more and know less while supermarket profits change from 1% to 35%." The Universal Product Code is the group of lines or bars which have appeared on almost all items in the supermarket. The code is a planned system, developed by the Uniform Grocery Product Code Council, assigning an identification number to every manufacturer in the United States and to each of the manufacturer&' products. When fully operative the system will enable every package to carry a unique UPC which will enable the product to be checked out at the retail store counter by a combination of accurate scanning and computer memory. Why Develop UPC The Supermarket Industry had many good reasons, but they can be summed up in one word, "PROFIT." 1. Labor rates in the supermarket industry are expected to double by 1980. UPC can cut the store staff in half. 2. Industry profits, after taxes, are less than 1%. UPC studies indicate a possible 35% return on investment after taxes. 3. Misrings (an error made by the checkout clerk) are 25% of sales. UPC eliminates misrings and allows price changes on the computer faster than the time it takes you to walk from the shelf to the checkout stand. How Widespread is UPC g The concept of UPC is being marketed by Distribution Codes Inc. DCI is owned jointly by the Uniform Grocery Product Code Council and the National Association of Wholesalers/Distributors. NAW/D is an association of associations. Each association member is coordinating its activities through Distribution Codes Incorporated. At present, UPC exists under several names. NAME National Drug Code Health Related Items Publication Code Alcoholic Beverages ABBREV. (NDC) (HRI) CUPC) CUPC) SPONSORING DISTRIBUTOR ASSOCIATION National Wholesale Druggists National Wholesale Druggists Council of Publication Distributors Wine and Spirits Wholesalers COMPUTERS and PEOPLE for December, 1975 Stationary & Business Supplies Code (DC) Electrical Supplies Air Conditioning ( DC) Plumbing (DC) Distribution Industries (DC) (DC) Business Records Assoc. Nat. Assoc. Writing Instrument Distributors Nat. Office Products Assn. Nat. School Supply & Equip. Assn. Paper, Stationary & Tablet Manuf. Assn. Wholesale Stationers Assn. Nat. Assn. of Electrical Dist. A/C-Refrigeration Wholesalers Nat. Assn. Plumbing Wholesalers NIDA/SIDA (Na t. & Southern Industrial Distributions UPC is growing continually, under its many different names; therefore most people tend to underestimate its power. In the Grocery Industry the middlemen and supermarkets, who are staunch proponents of the UPC, want to eliminate price marking on the shelf items. Their lobby is so strong that: A Maryland bill requiring price marking died in a State Senate Committee. A price marking bill passed the Illinois House and Senate Committee only to lose on the Senate floor by seven votes. Virginia Legislators killed a price marking bill because they didn't feel Automated Checkout Systems had been given a fair chance. New York State's price marking measure got sidetracked until 1976. The President's Consumer Affairs advisor is favorable to UPC, so favorable she suggested that Congress leave the UPC alone. Figure I shows the domino effect on industry as UPC moves from place to place. It started at Grocery (UPCC) but since Drugs and Health related items are sold in supermarkets, the Food and Drug Administration were convinced (lobbied?) to change the National Drug Code and the Health related item code to the 7 UPC format. Books are sold in supermarkets, as are magazines. The Publishers were the next to give in. Look at the UPC on the cover of "Family Circle". Recently the Alcoholic Beverage Commission was convinced to specify a UPC code. Remember, outside of New York State, alcoholic beverages are sold in supermarkets. The trend continues with stationery and business supplies. The logic is the same. In time everything must be scanned mechanically. The mass merchandising (Discount) stores are accepting UPC because it exists on products they buy. The Federal Department of Transportatiun is proposing to modify 49CFR577, the law controlling manufacturer marking of auto parts. This opens the door to UPC. It exists in wholesale electrical, air conditioning, refrigeration, and plumbing. UPC goes on and on and on without anyone realizing how quickly it grows or how much it affects their daily lives. What Does the UPC Symbol Mean The symbol is the means by which a machine readable identification mark can be placed on a package. The code is actually eleven digits which are machine readable. The first digit for Grocery Products is the "0" centered before the first Printed Bar. It is called the Number System Character. It was added to allow integration of other industries into the Grocery field. As an example, Books, Drugs, and Health Related items are sold in Supermarkets as are Stationery items. A look at the components of the symbol will help you to understand how it works in the scanning process. Figure 2 should be looked at after reading each paragraph to get full meaning. Let us read from left to right. Following the Product/Part Code Number is the Modulo Check Character. This provides the method by which the computer determines that what the scanning machine has read is accurate. Finally, the scanner sees the Right Hand Guard Bar which tells the computer that the data collection cycle for this symbol is at an end. A Right Light Margin again separates the symbol from any other printed matter. What's in a Bar The symbol is designed so that the computer will know whether a particular character is on the left or on the right hand side of the Center Bar Pattern. A Bar, or more technically a Character, is composed of 7 modulos which are series of light and dark bars. Each number from 0 to 9 has a different arrangement of the 7 light and dark bars which make up the character on either the left or right side of Center Bar Pattern. Figure 3 shows a left hand "0" consisting of 7 modules 2 barsj2 spaces which is Binary encoded 0001101 where "0" equals light and 1 equals dark. How Does the Computer Check for Accuracy From time to time the scanner will not be able to read the UPC symbol. This is because th~ Modulo Check Character printed on the symbol does not match the computer-calculated check character based on what the scanner read. The Modulo Check Character is a mathematical technique through which the scanner-computer combination verifies each product to make sure the UPC will be rejected if it is read incorrectly. The first area, at the left, is a white space, identified as the "Left Light Margin." This space separates the symbol from other printed matter on the package. It tells the scanner that a UPC symbol is coming. The complete coded symbol is shown at the top 021000 65883. Next we have a double vertical dark bar separated by a light bar. Thi sis called the "Left Hand Guard Bar." This pattern alerts the scanner to the start of data transmission. The middle line of boxes shows alternative odd numbers beginning with box 1 - 010683. This group of numbers is added equaling 18. Multiply the total by 3. The middle line total is 54. The first character scanned is the "Number System Character" previously mentioned. The example (Figure 2) shows the bar pattern for a "zero" which means it is a grocery product. The "0" in the left light margin provides a human readable character if needed. Random weight items have a Number System Character of 2; Drugs and Health Related items use 3; Coupons use 5; Alcoholic Beverages will use 8. The bottom line of boxes shows alternating even numbers beginning with box 2 - 20058. Added the total is 15. The remainder of the left hand half of the symbol is occupied by the five characters making up the "Manufacturers Identification Number." As an example, Kraft foods code is 21000. In the middle of the symbol is the "Center Bar Pattern". Its function is to separate left coded information from right coded information. The right five characters are the Product/Part Code Number. This number is assigned by the manufacturer to uniquely identify each item he produces. As a point of interest the left side is constructed of a different combination of light and dark bars than is the right. This construction will be explained later. 8 It works as shown in Figure 4: The combined total of the middle and bottom line is 69. This is subtracted from the next highest multiple of 10. In our example that number is 70. The result is a Modulo Check Character of 1, enabling the computer to instantaneously verify the accuracy of the scanner reading. Mr. Alan Haberman, President of First National Stores, suggested that if consumers were really interested in having prices on merchandise, the supermarkets would be glad to supply grease pencils so the consumers could do the marking themselves. An activist consumer group with grease pencils could cause havoc by making vertical lines in the UPC symbol. The computer will not accept the scan (machine reading). Even more confusing is the potential of consumer activists to break the code and modify certain items of both the UPC and its resultant modulo check character. The computer would go berserk, leaving the checkout clerk and the store manager in chaos. COMPUTERS and PEOPLE for December. 1975 • Factors Affecting the UPC Symbol The UPC symbol is fragile in its relationship to the scanner. It must be of a certain size. There must be sufficient contrast for the scanner to recognize light and dark bars. The symbol must be located in such a position as to provide enough room for the light margins, etc. The "UPC Symbol Location Guidelines" as prepared by Distribution Codes Incorporated are very precise. G R o C E In the store you might well find that a greasy or oily hand passed over the UPC symbol will prevent an accurate read. Crushed corners on boxes or dented cans may again prevent a positive scan. The stores equipped with scanner systems are in a minority now (less than 1% in 1975). The supermarkets while committed to UPC are approaching the transition slowly because the cost is very, very high. R Y I \ Who Benefits form UPC The winner with increased profits caused by UPC will be the supermarket operator and the wholesaler distributor. The McKinsey & Co. study, entitled "Phase I Report -- Grocery Industry Ad Hoc Committee Universal Product Code", shows that it will cost (quantifiable) manufacturers $37 million to gain a cost saving of zero. However Grocery Retailers (Supermarkets) and Wholesalers spend $292 millions to a cost saving of $444 million. FIGURE 1 Who Loses if UPC is Accepted The Consumer -- McKinsey estimates it will cost between $50,000 and $1,500,000 for a manufacturer to convert to UPC. As the manufacturer's cost rises so does his price. Have you noticed any savings from other supermarket gimmicks? Again the increases will be passed down to the consumer. With the Universal Product Code, you pay more and know less -- while supermarket profits go from 1% to 35%. UPC eliminates all price marking on packages. Suppose the house brand was priced higher than the so-called premium brand; without price marking how does the consumer know this. No (Jllt'r,: 0" ~).<.Cc... t"'s -; \\.~C~W(~L:., " CODED NUMBER SYSTEM CHARACTER PATTERN 7 0 LEFT HAND GUAno _ _ _ / CODED MANUF. IDENTIFICATION CODED PRODUCT PART NUMBER llfT LIGHT °R~:=~KH~:~RACTER GUARD BAR RIGHT LIGHT MARGIN NUMBER SYSTEM ,."') '·v",,',"\. ~'(\U"l What will be the effect on price as marginal manufacturers drop out of competition? Could it be that the wheeler-dealers have an even bigger innovation planned -- a seller's market? Supermarket 1984 is watching. Big Brother is small in comparison to what control of foodstuffs can do. The Uniform Grocery Product Code Council, its love child, Distribution Codes Inc., and the National Association of Wholesalers/Distributors say, "Give the system a chance." Did you ever hear of a system, once started, that could be stopped for less than twice its startup cost? Do you really believe that those people investing $292 million to gain a 35% return on investment after taxes will give up their profit? If you do, then you can believe in the tooth fairy. National, State, and Local Government, and the consumers are being set up for the great rip-off: UPC for you and me. COMPUTERS and PEOPLE for December, 1975 ' HUMAN READABLE MANUF. IDENTIFICA· TION KRAFT FOODS HUMAN READABLE PRODUCT/PART NO. MACARONI 8< CHEESE DINNER FIGURE 2 (please turn to page 20) 9 MULTI-ACCESS FORUM COMPUTER GRAPHICS AND ART - OPEN LETTER To: Subscribers and Intended Subscribers of COMPUTER GRAPHICS AND ART Dear Colleagues in Graphics, In our announcements we said we hoped to publish the first issue of COMPUTER GRAPHICS AND ART in January, 1976. We now have to delay our original plan, due to a temporary illness and hospitalization of the editor. The first issue of COMPUTER GRAPHICS AND ART is now scheduled for February, 1976. Our advisory board members and contributing editors to date include: Dr. Al Bork, University of' California, Irvine Dr. Charles Csuri, Ohio State University, Cleveland, Ohio Dr. Herbert W. Franke, Munich, Germany Dr. Ken Knowlton, Bell Telephone Laboratories, Murray Hill, New Jersey Dr. Frank Malina, Edi tor, "Leonardo", Paris, France Dr. Abraham Moles, Stuttgart, Germany Dr. Frieder Nake, Bremen, Germany Prof. Nicholas Negroponte, MIT, Cambridge, Mass. Ms. Jackie Potts, Social Security Administration, Washington, D.C. Dr. Joseph Raben, Edi tor, "Computers & the Humanities", Flushing, New York Prof. Erich Teicholz, Harvard Spatial Analysis Group, Cambridge, Mass. The first issue is now being prepared. If you are interested in sending materials for this first issue, please do so immediatelyl If you wish to participate in other issues of this quarterly, we ask that you send your materials as early as possible for consideration. We look forward to working with you, to make this a significant and useful periodical for people in computer graphics and art. We need your help and your subscriptions. If you have not yet paid for your subscription to COMPUTER GRAPHICS AND ART, please do so now. Or you may wish to enter a Library Subscription, whereby you and your colleagues may share this new quarterly. May we hear from you soon? Yours most cordially, Grace C. Hertlein Editor, COMPUTER GRAPHICS & ART Berkeley Enterprises Inc. Chico Branch 555 Vallombrosa, #35 Chico, Calif. 95926 10 IMAGES AND REALITY IN THE COMPUTER FIELD A DISCUSSION 1. From the Editor: It seems to me that IBM, like the U.S. government and the advertising people on Madison Ave., has given us lessons in image making -- the picturing of reality as something different from what it is. For example, I have never seen an IBM ad or publicity release which admitted in any way the existence of any other computer companies than IBM or any other computer products except those produced by IBM. So if you read only IBM advertising and publicity, you would never realize that other companies besides IBM are in the computer field. 2. From Jack Biddle President Computer Industry Association 1911 N. Fort Meyer Dr., Suite 801 Rosslyn, VA 22209 Why should IBM mention other companies in its ads? That's what an ad is for -- advertising one company and its products. I think it would be better to show: (1) How IBM argues that it has 38% of the market when their own studies and documents show their share to be 60 to 7~/o; or (2) How they participate in voluntary standards meeting to develop a communications protocol (SDLC) while simultaneously developing a different standard internally and spring their de facto standard on the world; or (3) Their contention before the courts that "the peripherals market is one big market because of the ease of developing interfaces," when their own internal studies showed that they couldn't enter the PCM market because of the difficulty and expense of the interface. THE PURPOSE OF FORUM To give you, our readers, an opportunity to discuss ideas, problems, and issues that seem to you important. To express comments, suggestions, and criticisms on what you find in this magazine. COMPUTERS and PEOPLE for December, 1975 .. Computers and Society: A Course at York University Larry J. Murphy A tkinson College York University 4700 Keele St. Donwnsview, Ontario M3J 2R7 Canada "1 believe there is an urgent need to 'humanize' the computer science major, in fulfillment of C. P. Snow's efforts for a 'bridge between the two cultures~" The Natural Science Department of Atkinson College, York University, Toronto, Ontario has offered a "general education" course entitled "Computers and Society" (N. S. 178) for at least seven years. When I began to conduct the course five years ago, it had already been offered for at least two years by a mathematician who treated it much like a programming course. But since the original course outline described an ~ssentially humanities' approach course on computers, there was little problem doing what I felt should have been done originally: offer a general education course on computers for both non-computer and computer majors. I believe there is an urgent need to "humanize" the computer science major, in fulfillment of C. P. Snow's efforts for a "bridge between the two cultures". I believe no instructors should keep him back from the general history, the history of the theory, the literature (both fiction and non-fiction), and especially the ethics of his chosen field. tJ Over the past five years N. S. 178 has been offered seven times (including three summers); a total of about 400 students have completed the course (five classes of about 50 students, two of about 75). The course is a full year course as is customary in Canadian universities; it meets for three hours a week from September to May, for a total of about 70 class hours. The summer sessions cover the same material over the same number of class hours, but in half the number of months (May to August). Of the 400 students who h~ve completed the course, approximately 8% were Computer Science majors. My experience has been that they were, overall, the most appreciative single group since when they began they had no idea there was a "history of computers," let alone such an extensive one. They also entered the class with a total lack of knowledge of: the "history of the theory of computers"; the literature on computers (except programming manuals); and most shockingly of all, any appreciation for ethical questions regarding computers and their applications! I believe this experience alone is enough to recommend courses in "Computers and Society" to all computer science majors and minors. The readings books used in N. S. 178 are: Pylyshyn, Zenon W. (ed.): "Perspecti ves on the Computer Revolutio~', Englewood Cliffs, N. J.: Prentice-Hall, 1970. COMPUTERS and PEOPLE for December, 1975 Lewis, Arthur 0., Jr. (ed.): "Of Men and Machines", New York: E.P. Dutton & Co., 1963. Bowles, Edmund A. (ed.): "Computers in Humanistic Research", Englewood Cliffs, N. J.: Prentice Hall, 1967. and either: Cress/Dirksen/Graham: "Fortran IV with Watfor and Watfi v", Englewood Cliffs, N. J.: Prentice Hall, 1970. or: Smyth, J. Morgan: "York APL", Toronto: Ryerson Poly technical Institute, 1972. For those who feel they need extra support in the basic areas: IBM: "More About Computers," Armonk, N. Y.: IBM, 1971. Scientific American: "Information", San Francisco: W.H. Freeman & Co., 1966. For those who wish to specialize in applications of computers: Kanter, Jerome: "The Computer and The Executive", Englewood Cliffs, N.J.: Prentice Hall, Inc., 1967. Sanders, Donald H.: "Computers in Business, An Introduction", (2nd Ed.), New York: McGraw-Hill, 1972. Shorter, Edward: "The Historian and the Computer", Englewood Cliffs, N.J.: Prentice Hall, 1971. The course is divided into "lecture" sessions and "tutorial/seminar" sessions; the lecture session is used for guest lectures, films, and the general dissemination of information. Since I've come to computers through the history of technology -- Hollerith and his electric data tabulating system -and most research in what might be called the "prehistory of computers" or "prerequisites of the computer" is in a very scattered primary literature, if even that, I can see no better alternative to the traditional lecture as the best method of sharing such background with the class. Certainly no adequate text or even readings book has yet appeared. In the "tutorial/seminar" sessions the issues brought up by the lectures, the readings, and the students' research are discussed. 11 In addition to the "lectures" and the "tutorial/ seminars", the student is required to do work outside of class which includes a minor programming project (relying on the York Computing Centre resource personnel), and two bibliographic projects (relying on the York Library resource personnel). These projects require the student to actually propose, flow-chart, programme, debug, and successfully run a programme on the computer, one that is useful in their area of interest. They may use either FORTRAN IV with WATFIV, (or COBOL if more relevant to their interest), or York APL (Iverson's A Programming Language). This is an interactive-language developed-at York as an alternative to the batchmode FORTRAN IV with WATFIV. The projects also require the student to become familiar with the literature of and on computers; they require the student to perform (manually and/or on-line), two bibliographic searches at different levels on computer topics, to evaluate the retrieved articles, and ultimately to abstract selected articles. Systems of three major computer manufacturers are visited by the students: IBM at York; Univac at the Metro Toronto Computer-Controlled Traffic Light Centre; and CDC at the Control Data Institute in Toronto. Obviously, the structure of NS 178 is different from other proposed courses, but the content is very similar, as can be seen by comparing the outline below with that of other courses in Computers and Society. I am much pleased that the U.S. computer community has been promoting courses in Computers and Society, since I feel NS 178 has been very valuable to most of the students who have completed it. Period 1: Outside of Class FORTRAN IV with WATFIV or York APL Visit to York Computer Centre Series of 12 1/2 hour video tapes on Fortran IV with WATFIV Period 2: Lectures Survey of "Pre-history" or "Prerequisi tes of the computer": Information Storage and/or Retrieval Methods/ Devices: Language (words); writing, (clay, papyrus); books (scrolls and codices, tape and cards); Hero(n) odometer; Vitruvius odometer; Danzig ribbon weaving loom; Wren and Hooke (1660s); Horse way-wisers; Falcon; Bouchon; Vancanson; Jacquard; Babbage; the Scheutzs; Ritty Brothers; Hollerith; Powers; Comrie; Aiken. Mathematics, mathematical regularity: Language (numbers); counting; one-to-one correspondence; bases; arithmetic calculating or computing; place holder; zero; Leonardo da Pisa; number analysis (concerned with calculation); Stevin; Napier (logarithms); method of differences; Descartes; Leibniz (binary arithmetic); Boole; Babbage; Maxwell (formalization of the governor); number theory. Period 2: Tutorial/Seminars History (integration of lectures with Pylyshyn and general history of western civilization). Period 2, 3: Outside of Class Minor Programming Project In closing, I wish to stress how important I believe it is not to restrict the courses in Computers and Society to non-computer majors or minors. In fact I strongly advocate that, if a university has any required courses, a course in Computers and Society be required of all computer majors and minors -- and perhaps not just of the students, but of faculty and practitioners of Computer Science as well. Perhaps even a national or international society of computer scientists could (or should) offer and promote such a course for all their members. Period 3: Lectures Logic, logic devices: Analysis of language (both words and numbers); Aristotle's logic (syllogism); Ramon Lull; Swift; Hobbes; Leibniz; Charles, the Third Earl of Stanhope; Boole; Venn; Jevons; Peirce; Marquand; Turing (Post), Shannon. Period 3: Tutorial/Seminars Theory: Algorithms, automata (mathematical), Cybernetics (Wiener, von Neumann) Course Outline: First Half Year: Period 1: Lectures Brief history of western civilization as the history of science and technology. Define "field." "Computer Science": is it a science, or part of "Information Science"? Computers allow "control" of information for the first time. "Computer Revolution"? the 2nd Industrial Revolution. Period 1: Tutorial/Seminars Discussion/criticism of: Pylyshyn's "Perspectives on the Computer Revolution." Period 4: Lectures Digital devices (counting devices: Fingers (toes); one-to-one representation; abacus; computing jetons; digital clocks; Napiers' bones/rods; Schickard; Pascal; Leibniz; Morland; Stern; De Colmar; Babbage; the Scheutzs; additional adding machines and the comptometer; Ritty Brothers; Bollee; Ludgate; Richardson (weather "forecast factory"); Shannon; Aiken (A.S.C.C.); Manchly & Eckert (ENIAC). Analog devices (measuring devices): Stonehenge; ruler; "tape measure"; ancient Greek computer; Planetaria; analog clocks; astrolabs; Arab planetary computers; slide rules (circular and linear); Orreries; Big Horn Medicine Wheel; Amsler planimeter; Kelvin (tide predictor); Kelvin (differential equation solver); Michelson & Stratton (harmonic analyzer); Bush (differntial analyzer). Period 4: Tutorial/Seminars History of the theory, way it came together. 12 COMPUTERS and PEOPLE for December, 1975 .. Period 4: Outside of Class Visit to outside computer facility. Period 5: Lectures Feedback devices; (C) or Ktesibus (waterclock); Hero(n) (wine dispenser); thermostats; windmill control mechanisms; Harrison's chronometer; Watt's steam engine governor; Babbage's bell; Claude Bernard; L.J. Henderson; Walter B. Cannon; Wiener (cybernetics); von Neumann. Automata: Mechanical regularity; Hero(n); Albertus Magnus; clocks-clockwork mechanisms; Orreries; Descartes; Newton (clockwork universe); Borelli; Vaucanson; Droz; La Mettrie; Industrial Revolution (automatic actions sophisticated); Babbage; "Turing Machine." Period 5: Tutorial/Seminars • Artificial Intelligence Discussion/criticism of Lewis, "Of Men and Machines" and latter part of Pylyshyn, especially questions/ problems of ethics/privacy (Canada, Great Britain, U.S. hearings/legislation on data bank, etc.) Guarantee of privacy re: data banks Computer Crime "Computer as Friend" "Computer as Enemy" Futures Discussion/Criticism of Bowles "Computers in Humanistic Research": Comparison of humanistic applications with non-humanistic applications; Comparison of EDP and computer applications in scholarly research • Outside of Class First Bibliographic Project (on computer literature in general) Second Bibliographic Project (on the literature of computer applications, theory, history, in all 8 choices). Visit to UNIVAC Computer facility. Optional major research project (historical, theoretical or applied) in respect of interest of student (about 1/3 of the class). 0 Electricity, communications: Lodestone; atomic theories (Democritus & Lucretius); compass; Gilbert; 2 fluid theories of electricity; Franklin; electrical games; electrical medicine/psychology; Volta; Ampere; Faraday; Ohm; Henry; Morse (telegraph); Bell (telephone); Edison (Pearl Street station); AC/DC battle; Niagara Hydro; Marconi; Kettering; relays; vacuum tube (diode/triode); Shannon & Weaver; Bell labs; transistor. General integration of the 8 "strands" which come together to form the modern digital computer. Examples of combinations of "threads" prior to total combination. Arrival of modern digital computer: U.S. (A.S.C.Co, ENIAC, UNIVAC); England (National Lab, Cambridge, Manchester); Canada (Saskatchewan); Rest of World (Zuse, etc.) Software/Hardware. Structure of a computer Changing Technology, futures re: technological limits. Example of subtraction unit. Computer languages (according to Jean Sammet, over 1500 languages), futures Period 6: Tutorial/Seminars Artificial Intelligence Period 6: Outside of Class First Bibliographic Project (on computer literature in general) Second Half of Course Lectures e T utoria I/Seminars Period 5: Outside of Class Period 6: Lectures rJ Humanities: Control of literature (umbrella); Art-graphics (film, examples); Music (listen to tapes, examples); Poetry (examples); Future. "Where's it all leading?": Leisure Ethic overtaking the Work Ethic. Applications: Business/Commerce: Bookkeeping/accounting, etc.; Inventory control (guest lecturer from local bank) Industrial: Hybrid computers; Control of mfg. process; Examples Physical sciences: History of use; Exceptional use; Examples Social Sciences: History of use; Exceptional use; Examples (Guest lecturer from Traffic Planning Department of Toronto) COMPUTERS and PEOPLE for December, 1975 WHO'S WHO I N COMPUTERS AND DATA PROCESSING THE SIXTH CUMULATIVE EDITION WHO'S WHO ENTRY FORM (may be copied and expanded on any piece of paper) 1. 2. 3. 4. 5. Name (please print) _ _ _ _ _ _ _ _ _ _ _ __ Home Address (with Zip) _ _ _ _ _ _ _ _ _ __ Organization _ _ _ _ _ _ _ _ _ _ _ _ _ __ Its Address (with Zip) _ _ _ _ _ _ _ _ _ _ __ Your Title _ _ _ _ _ _ _ _ _ _ _ _ _ _ __ 6. Your Main Interests: Applications ( ( Business Construction ( Design 7. 8. 9. 10. logic Management ( Mathematics ( Programming ( ( ) Sales Systems ( ) ( ) Other please specify: Year of Birth _ _ _ _ _ _ _ _ _ _ _ _ _ __ Education and Degrees _ _ _ _ _ _ _ _ _ _ __ Year Entered Computer Field _ _ _ _ _ _ _ __ Your Present Occupation _ _ _ _ _ _ _ _ _ __ 11. Publications, Honors, Memberships, and other Distinctions: _ _ _ _ _ _ _ _ _ _ _ _ _ __ 12. Do you have access to a computer? ( ) Yes ( ) No a. If yes, what kind: Manufacturer? _ _ _ _ __ _ _ _ _ _ _ModeI ?_ _ _ _ _ _ _ _ __ b. Where is it installed: Organization? _ _ __ Address? _ _ _ _ _ _ _ _ _--::--_ _ _ __ c. Is your access: Batch ( ) Time-Sh~red ( ) Other ( ) Please explain _ _ _ _ _ _ _ __ 13. Do you subscribe: - to Computers and People (formerly Computers and Automation): ( ) Yes ( ) No ( ) Yes ( ) No - to The New York Times: 14. Associates or colleagues who should be sent Who's Who entry forms (name and address) (attach paper if needed) When completed, please send promptly to: Who', Who Editor, Who's Who in Computers and Data Processing. RFD, Box 177, Hampton, CT 06247 13 Software Should Be Patentable ADAPSO [Association of Data Processing Services/ Software Industry Association] 1420 Walnut St. Philadelphia, Pa. 19102 "Making clear that patents may be available for inventions in software would unleash enormous innovative talent." Association of Data Processing Service Organizations, Software Industry Association (hereinafter ADAPSO/SIA) is a nonprofit trade association of 62 companies in the computer field/l/, approximately 7~/o of whom concentrate their attention in the software products industry, and the remainder largely ~~ the furnishing of varied software services to computer users and to hardware manufacturers. ADAPSO/SIA presents its views to the Court because an inaccurate description of software technology and the software products industry has been set forth by Petitioner's Brief and the supporting brief of the hardware manufacturers' association, CBEMA. ADAPSO/SIA companies are not "idea or think tanks." They are companies engaged in building and marketing machines for which profit-conscious companies will and do expend money. ADAPSO/SIA's members believe they are entitled to the same patent protection for their innovative products as that granted the hardware manufacturers. Nature of the Industry A. The Absence of Competition in Software Whereas ADAPSO/SIA is an organization of relatively small companies, with no one company exerting dominance over all the others, CBEMA is an organization of relatively large companies, operating in a computer hardware industry "shaped and dominated by IBM."/2/ IBM's dominance is such that its 70% or better share of the computer hardware market is nearly ten times that of its nearest competitor, Sperry-Rand./3/ Other giant companies such as Honeywell, Burroughs, Control Data and National Cash Register are compelled to share the remaining portion of the market; General Electric and RCA found themselves forced to withdraw entirely from competition. Thus, it is IBM's voice and actions which have and which do dominate the computer industry. In this case the Government remains silent while CBEMA distorts the history of the computer industry to assert that "the computer industry has developed in an atmosphere of free interchange of computer Based on a portion of the Brief Amicus Curiae No. 74-1033 for ADAPSO/SIA filed with the U.S. Supreme Court on October 16, 1975. 14 programs •••• "/4/ How "free" the atmosphere has been in the computer industry is best shown by the Government's pretrial brief in "United States of America v. International Business Machines Corporation./5/ t ~ ., The Government in its antitrust action against IBM notes the development of the computer industry and fi nds that in "the earliest days of the development of the computer industry, there was nothing that could be identified as a software industry."/6/ This was in part because users design some of their own software and because the "computer systems manufacturers, following IBM's lead, provided [free] much of the software [that] users required."/7/ It was not until the late 1960' s that "the independent software products market emerged, pioneered by the fi rm Applied Data Research, Inc.," /8/ one of the amici herein. As the Government notes, "in light of the fact that IBM provided its customers with their software requirements as part of the IBM 'total systems solution,' independent software product firms had to market their offerings against products for which there was no identifiable price. As a result, only those companies which could offer products not available 'free' from IBM or which could demonstrate the technological superiority of their products in comparison to IBM's had any chance of survival."/9/ The result was that the independent software product firms lacked "a realistic opportunity to compete."/lO/ That this was not an innocent case of cause and effect was shown by IBM internal memoranda which revealed that "the value of this exclusionary effect derived from bundled pricing [so-called free software]/ll/ was fully appreciated by IBM •••• The effect of IBM's ability to wield such exclusionary power has been felt most acutely ••• by those firms seeking to market software products."/12/ The Government has also noted that "IBM internal memoranda .•• reflect that from as early as 1965, IBM was aware of the marketing benefits derived from bundled pricing and the anticompetitive effect it had on software companies."/13/ The net effect was that "bundled pricing enabled IBM to exclude competition from independent software vendors."/14/ The Government concludes that its study of IBM documents "i llustrate wi thout ambigui ty that. its bundled pricing marketing approach was a practice known by IBM to be, legally indefensible. Neverthe- COMPUTERS and PEOPLE for December, 1975 C~ less, IBM consciously continued bundled prIcIng because of the competitive leverage it afforded IBM in maintaining its monopoly position."/lS/ Software monopolies are also maintained by other hardware manufacturers through the use of bundling. A small software company has sued Sperry Rand, charging it with refusing to place a price on its bundled software and thereby making it impossible for the small company to sell its software in competition. /16/ Honeywell in bundling its software and hardware asserts that the software is "free." But when the hardware buyer attempts to transfer that software along with the hardware to another company, Honeywell claims that it owns the software and will control who can have possession./17/ B. The Resulting Poor-Quality Software The CBEMA brief also boats of "the tremendous growth of the computer software industry and the vast number of breakthroughs in the field of programming, which have occurred in the last two decades" (CBEMA Br. 12). How different the facts really are in the computer software field is made clear by the testimony of Dr. Ruty M. Davis, Director of the Center for Computer Services and Technology of the National Bureau of Standards/18/ characterizing the present condition of software as "poor-quali ty software," a condi ti on whi ch she described as the "crucial computer problem" confronting the nation today. Speaking on the "seriousness of the problems besetting both the consumers of computer products and services and the suppliers of these products and services" Dr. Davis stated: The crippling problems are lining up in the software rather than in the hardware field. In particular, they fall under what we call the application-independent problem category ..• these are the software problems which are common to many applications. That the condition described by Dr. Davis in 1972 still holds true is seen by her warning at the CBEMA Spring meeting, May 29, 1974 that "the difficulty and cost of developing and maintaining quality software have become the single largest consideration in computer utilization and composes a serious limitation on the cost-effective use of computers." s Even IBM acknowledges that "the biggest problem facing programming today is the extreme difficulty and cost encountered in creating and maintaining large programming systems."/19/ At the National Computer Conference held early this year it was admitted by a leading hardware manufacturer that the "software dinosaur" has not "kept pace with the technical needs of the industry."/20/ As a result of the software users being at the mercy of the hardware manufacturers, the users are forced to make do with the "free," poor and technically inferior software./2l/ The reason for the poor state of the development of software lies in the shackles IBM has placed upon free competition. History shows that it has been small technological companies and independent inventors, and not the vast financial combines such as IBM, which have been responsible for much of the innovation of this age. A recent government report has found that "studies of the sources of invention and innovation have shown that independent inventors and small technologically based companies are responsible for a remarkably high percentage of the important inventions and innovation of this century. /22/ COMPUTERS and PEOPLE for December, 1975 C. The Small Company Potential for Competition The small, mostly "young and struggling", companies who "surely possess excellent technical innovative capabilities" and "the principal technical capability ••• to work .•• on our critical computer problems" /23/ have been wrongfully denied the incentive of the patent system, which has been assured to the hardware manufacturers for products they sell. The patent incentive is both a form of recognition and a major aid in obtaining the necessary financing without which these companies face the prospect of shriveling and dying. It is no accident that the monopolistic and exclusionary practices of IBM have permitted only a small number of companies in the software products field to achieve a relative degree of success. As the Government states in its pretrial brief "operating systems continue to be part of IBM's bundled price structure. Thes continue to be bundled for the marketing leverage they afford IBM in terms of increasing the sale of IBM computer equipment and forestalling the growth of independent software companies."/24/ D. The Importance of Patent Incentives A patent on a software program creates an economic toehold in the monopoly-dominated computer field. The software products company characterized by the Government as the pioneer in the independent software products market, Applied Data Research, Inc.,/2S/ stands as proof of the importance of software patents./26/ To a large financial giant, the economic value of a patent may not loom large; to the small software companies upon which the future of the development of quality software depends, the financial value of the patent may spell the difference between life and death. To banks and financial institutions the existence of apatent or even the potentiality of obtaining one may well be a decisive factor in determining whether a loan should be granted. To prospective investors a patent or the possibility of obtaining one may be the principal element in the decision whether to invest. Making clear that patents may be available for inventions in software would unleash enormous innovative talent. It would have the direct opposite effect forecast by IBM and the other hardware manufacturers -- it would enable competition with those companies and provide the needed incentive to stimulate innovation. Patent protection would encourage the free dissemination of program innovations which is so necessary to· stimulate technological progress. Disclosure is the statutory price paid by the inventor for patent protection. Without such protection inventors principally have to rely on the law of trade secrets in order to secure the economic value of their inventions, thereby excluding from the world-at-large disclosure of the invention. When the Patent Office for its own convenience/27/ urges that inventors rely on trade secrets in lieu of patents, it is ignoring the mandate of the Patent Laws, and when it urges copyrights as another potential alternative, it is denying the inventiveness of an entire technology, thus abdicating its responsibility under the Patent Laws to grant patents for machines that "advance the Progress of the useful Arts." Such computer programs as are freely disclosed in the trade literature of the computer industry 15 have little economic value or technological worth. All that this kind of "free exchange" has produced for the computer industry has been "crippling problems" and "poor quali ty software." The real strides forward in computer development occurred in hardware, an area fully protected by the patent laws. In a competitive economy, that which is given away for nothing tends to have the same value. Non-profit companies are non-existent in the computer industry. CBEMA favors its version of "free interchange of programs" because that has been one of its major techniques in excluding competition and in monopolizing the computer industry. It is profits and not "free interchange of programs" or "innovative software that CBEMA seeks." The economic forces opposed to patent protection were clearly identified by Judge Rich in his dissenting opinion below. As he stated it: On the one side ••• against patenting programs or software [were] collective forces of major hardware (i.e., computer) manufacturers and their representative associations who, for economic reasons, did not want patents granted on programs for their machines. (Emphasis in the ori gi nal. ) This portion of Judge Rich's "dissent" (a dissent whose purpose was to provoke this Supreme Court review to obtain a ruling providing for software patents)/28/ is ignored by the Government as is the fact that Judge Rich reaffirmed his view as to the soundness of his previous opinions on computer technology. When one knows that every action taken by IBM has been motivated by its monopolistic and exclusionary desires, one understands why IBM has led the legal fight against patents for software. It is not to strengthen the computer industry but only to strengthen IBM's stranglehold upon it that IBM postulates its legal theories in opposition to patents. Strange indeed is it that the Government despite its firsthand knowledge of IBM's efforts aimed at "forestalling the growth of independent software companies"/29/ joins hands herein with IBM in furtherance of IBM's monopolistic endeavors. To arbitrarily deny patent coverage as urged herein by the Patent Office is to denigrate software technology and to cast a chilling effect upon inventi veness. Summary of Argument The writ of certiorari should be dismissed as improvidently granted. because of the inadequate record, the jurisdictional barrier to the reconsideration of a central factual issue, and the inappropriateness of the principal question for which certiorari was granted. To consider what the Patent Commissioner presents as the key issues in this case would require this Court to undertake a thorough inquiry into the complex technological issues of special-purpose computer construction, but the record does not provide the factual basis which would enable the Court to do so. The Supreme Court is not the appropriate forum for initial fact finding. The most basic technological issue -- the Board of Appeals' finding that programming a general-purpose computer restructures the computer into a different machine -- is not jurisdictionally subject to review because 35 U.S.C. 141, et. seq. bind the Commissioner of Patents by Board determinations. Since the Board is the alter ego of the commissioner, his attempt to appeal its finding is in essence a nonjusticiable intra-agency dispute. Moreover, the C.C.P.A. and the Board have considered the basic technological fact issue, each has special credentials of technological expertise and both have found in favor of the restructuring principle. The broad question for which certiorari was granted -- whether innovative machines which can be embodied in computer programs are patentable subject matter -- is inappropriate for judicial resolution in this case because patentability depends on the structural nature of the specific invention not which of alternative types of construction was employed. The petitioner has conceded that the Court cannot formulate a rule of general applicability in its decision of this case and that the only other question presented -- obviousness under 35 U.S.C. 103 -- is not worthy of this Court's at~ tention. The petitioner's main legal arguments depend on a mischaracterization of computer program technology. An accurate picture of this technology reveals that a programmed general purpose computer is a different machine than the unprogrammed machine. The designer of software, like any engineer, builds machine structures. not methods of doing business; he develops machine solutions for machine problems. Computer innovations embodied with stored computer programs are legally entitled to the same patent protection as innovations embodied in wire-connected electronic circuits, for technologically "hardware" and "software" are equivalent. The facts that a programmed computer (what respondent defines as his invention) is a machine and the innovative aspect of it is a machine structure cannot be overcome by petitioner's legal arguments. A machine is not a method of doing business. An innovative machine structure is not the mere embodiment of an abstract idea. Machines are patentable subject matter and respondent's only argument against software being patentable subject matter is the unsupported statement -- appealing perhaps to a layman but universally rejected by the experts -that a program is not a machine but merely an idea, "new use," or "method of doing business." Patent protection for software is vital to the health of the data processing industry. In a field dominated by IBM, the growth of the small independent software company has been stifled by the bundling practices of the hardware manufacturers which continue to this day in the systems programs area. Only through the availabi li ty of protecti on for their products can the software producers hope to bring competition to an industry that sorely needs it. The absence of patent protection has forced reliance on trade secrecy and has had the negative effect of deterring disclosure of innovations. The availability of patents, with their public disclosure requirement, would "promote the progress of the useful Arts," in this most sophisticated. pervasive and vital area of technology. Copyright protection is inadequate and inappropriate to protect innovative machine structures. Copyright of a particular set of computer language statements does not protect the novel machine structure that is the core of any software invention. The Constitution establishes innovation as the prerequisite for a grant of exclusive rights to machine structures; attempts to protect them via copyright (please turn to page 20) 16 , COMPUTERS and PEOPLE for December, 1975 ·r • The Computer "Glass Box": Teaching with APL -Iverson's "A Programming Language" - Part 12 Howard A. Peel/e, Director Instructional Applications of Computers University of Massachusetts Amherst, Mass. 01002 'This approach utilizes a computer program more as a glass box than a black box, and seeks to make key computer concepts become transparent to the student." Je :e; , (Continued from the November issue of "Computers and People", page 26) The enterprising student might elect to automate the production of MICROSCENEs: l 'I ,. V AUTOPEEK 'I Soon it should become clear that these two SCENES cannot be distinguished on the basis of random microscenes alone. (Of course, if one could trace sequentially through a scene, its "connectedness" or "non-connectedness" could be determined easily.) I I [lJ Computer Art PEEK MYSTERY [2J [3J I' [4J -+1 The world of computer art can be opened to students through a few simple APL programs. Beginning with an excursion into automated design, the student can proceed to encounter questions of aesthetic judgement and artistic technique. For example, consider the following DESIGN program. V PICTURE + SIZE DESIGN COLORS AUTOPEEK I) ; J llOWMANY + P [2J PICTURE + [1 *** * *** * * * It ... * * **** * * ) ; ** COMPUTERS and PEOPLE for December, 1975 COLORS[?SIZEpliOWMANYJ V DESIGN uses some COLORS (symbols on the keyboard) and some SIZE (two dimensions of a matrix) to produce a PICTURE. A simple program like DESIGN goes a long way with children. They seem never to tire of it, for it can produce quite a variety of designs: 10 ** * COLORS 20 DESIGN '--11-_ I 1-1_-11 1-- -I -_I- - -_ - - - - _ - -I I - - I - - I - -- 1__ -- I 1- I L - I - I I __ I 1_ I I - - I _I I I -_ I I I I 1- -1_ - - I 11--_--1- 11_--_ I-I _ -1 __ 1 --- -- - - --11----1------ 17 10 DESIGN 20 Another approach to computer art involves viewing programs which simulate an artistic technique. For example, consider the program MONDRIAN below (named after the Dutch abstract painter). '//6~V\\' 6\6V\\6V/V/V/V//*\// V/8VV6V/V\/~\///6/\V \VV///V~/\~\\/\\8\V\ V/V~/\6//V\//\//V~VV V MONDRIAN 6V\\*V6\V\/V/~v/\\\\ /88//~V8///\6/8/V~8~ [1 //6\V/\v/V\/\~8il/V\\ VVV\\~\~V/\6Vil~6666/ \/*\VVV~\8V\//\~\V~\ V~b\\\VV\68V\~\\\6\il 10 10 20 DESIGN DESIGN 20 '0 0 0 0 00 00 00,0 0 0 0 00 0 00 000 0 0 00 0 0 0000 0000 0 0 0 00 ,0 0 0 0 00 ,0 0 00 0 0 0 00, a 0 •0 o. , '00*'[?3J [2J DAB: COLOR [3J SIZE [4] PICK: PLACE [5] OVERLAP [6] +PICK IF OVERLAP> 2 [7] [8] CANVAS[PLACE[1]+lSIZE[1],PLACE[2]+ lSIZE[2]] + COLOR +DAB IF (PERCENT ' , ON CANVAS) > 67 [9] CANVAS + 3 + ?6 10 5 + ?30 50-3I2E + +/+/CANVAS[PLACE[l]+lSIZE[l]; PLACE[2]+13IZE[2]]~' , OVERLAP measures the extent of overlap with DABs already on the CANVAS. IF OVERLAP is greater than 2, then it will PICK another PLACE. (This is tantamount to finding relatively open space on the CANVAS). IF, however, OVERLAP is not too large, the COLOR is put on the CANVAS at the PLACE and in the SIZE selected. 20 DESIGN '00* *00' * *UD *UOOOO*ODD**D UOOO 0 0000* **00* *OODUO *OUO*O* 00*00 *0 00000*0 OOO*UO OO***OOO**UO 00*0000 ***0**00**00* 00*000 * *****00* **00*00*0 *0*00*00*0*0*0 0*0* *0 *000* 00*0 *0000 000000000*0* 00*0000 The program continues to DAB IF the PERCENT of blank spaces ON the CANVAS is greater than 67. In other words, as soon as it is 1/3 filled up, CANVAS is displayed. Note: MONDRIAN uses two simple sub-programs (mostly for readability). They are PERCENT and ON: V HUNDREDTHS [1] These black and white "Computer hieroglyphics" may have dubious aesthetic appeal. But one can imagine -- instead of these typed symbols -- randomly generated swatches of color, perhaps displayed on a television-like screen. Extensions of this approach to computer art include: (a) automating DESIGN, (b) weighting the selection of COLORS, (c) asking for human judgement (Do you like it or not?) in order to adjust weights on COLORS or other aesthetic factors, and (c) piecing together several computer-generated PICTUREs into a montage. 18 3 0 5 0 p' + MONDRIAN begins with a blank canvas (arbitrarily set at.30 by 50). Then the program chooses a random COLOR, SIZE and PLACE to DAB. 0 0 10 t: Al{ VAS ,-, 0 00 0 0 J " PBRCBNT N HUNDREDTHS +LO.5+100 x N V DBNSITY [1] + + SYMBOL ON PICTURE DBNSITY + (+/+/SYNBOL=PICTURE) ( X/pPICTURE) T COMPUTERS and PEOPLE for December, 1975 Now, MONDRIAN at work: The DRILL program beings with a NEWPROBLEM and prints 'MULTIPLY', a simplified message telling the student what to do with the two numbers that will follow. The FIRST number is an integer randomly chosen between 1 and 20, and the SECOND number likewise. MONDRIAN 0000000000 0000000000 0000000000 UOOOOO OOOUOO 000000 0000000 0000000 0000000 ********** ********** ********** **********00000 00000 00000 0000000 0000000 0000000 OOOOOuU 00000 00000 OUOOOOUOO 00000 000000000 ***** OUOOOOUOO ***** ***** *****000000 *****OOOLJOO *****000000 ***** ***** ***** 0000000000 0000000000 0000000000 0000000 UOOOOOO 00000 00000 00000 The student may ENTER his ANSWER which is then judged for correctness by the program. IF the ANSWER equals the FIRST number times the SECOND number, a NEWPROI3LEM is gi ven; otherwi se (if ANSWER is wrong) 'NOPE. TRY AGAIN.' is printed, and the student may ENTER his answer again. In order to use the DRILL program, its name is typed, as shown below: OOOOOOOLJ 00000000 00000000 00000000 00000000 OUOOUUOO ***** ***** ***** ****** ****** ****** ******** ****** ******** ****** ******** ********** ******** ****** ******** ****** ************ ****** ***** ****** ***** ****** DRILL MULTIPLY 19 2 0: 38 MULTIPLY 16 18 0: Possible extensions of this kind of program include: (a) simulating and combining additional artistic techniques (those that can be operationalized), (b) computing abstract measures of difference between random "painting" produced by the computer, (c) converging to minimal differences from a previously specified "ideal" painting, and (d) developing a model for aesthetic judgement -- perhaps one which "evolves." Computer-Assisted Instruction e t I1S In order to emphasize the contrast with conventional uses of computers for teaching, the last glass box program here illustrated is from the area of computer-assisted instruction. Instead of concealing the CAl program -- usually designed to control the child's behavior -- we show him the mechanism itself so that he may see how it works and ultimately see how to control the computer and control NOPE. TRY AGAIN. 0: 288 MULTIPLY 8 12 0: 96 MULTIPLY it. 14 Consider the APL program below which exposes the essence of drill-and-practice in multiplication skills. ry DRILL 18 [lJ NEWPROBLEM: [2J 'lviULT IPLY' [3J o+ FIRST [4J o SECOND [5J ENTER: ANSW8R [6J ~NEWPROBLEM [7J [8J 5 248 + ?20 + + ?20 + 0 IF ANSWER FIRSTxSECOND 'NOPE. TRY AGAIN. , ~ENTER COMPUTERS and PEOPLE for December, 1975 0: Students notice immediately that this program has a flaw. It does not stopl Scrutinizing the program's definition reveals that after getting a multiplication problem correct, one always gets a new problem -- ad infinitum. Also, after getting a problem wrong, the student must answer that same problem again -- another potentially endless loop. The student's first task, then, might be to build in an option to stop the program at will. DRILL is, of course, only a prototype program. With other modifications of one's choosing, DRILL 19 may become considerably more sophisticated. Possible extensions include: (a) displaying pictorial feedback like a "smiley face" for positive reinforcement ***** or a "grouchy face" ***** * 00* * * V \_1 * * * * * x x A 1-\ Sobczak - Continued from page 9 MODULOS * * * ***** ***** instead of 'NOPE. TRY AGAIN.' v (b) presenting a prespecified total number of problems, (c) limiting the number of allowable mistakes on individual problems (or all problems), (d) generalizing the multiplicands to create a more flexible range of problems (including negative numbers, decimals, etc.), (e) gathering performance data, (f) using performance criteria to make diagnoses, (g) automatically adapting level of difficulty based on diagnoses, (h) adding personalized instructions, and (i) building in timing components, jump-ahead options and hints. 1. 2 3 a e ( m b Conclusion v. These are but a few APL "glass box" programs designed to stimulate students to think about selected concepts. Each of the sample programs shown here can be used as is and, of course, can be extended in a myriad of directions. Other topics well-suited for this pedagogical approach include topics drawn from linguistics, statistics, mathematics, engineering, ecology, and physical sciences. The challenge to educators, then, is to identify such topics suitable for embodiment as glass box programs, to search out the kernel concepts to be taught, and to lead students to better understandings of those concepts using a programming language. d u ( c ( t 000 o I I , +- BINARY EN· CODING b c d o LEFT SIDE OF UPC SYMBOL ZERO Notes P /1/ A Programming Language (abbreviated APL) is a mUlti-purpose computer programming language developed by Kenneth Iverson of IBM. Originally conceived as a unifying mathematical notation, APL has since been used successfully in fields such as business, scientific research and education. /2/ This program is similar to one written in a simplified FORTRAN by John Loehlin in "Computer Models of Personality", Random House, NY, 1968. b s a FIGURE 3 h m m f NUMBER SYSTEM CHARACTER MANUFACTURER IDENTIFICATION t PRODUCT/PART NUMBER P w /3/ This question is treated as a theorem by Minsky and Papert in their book "Perceptrons;' MIT Press, 1970. c STEP 1 References 54 c STEP 3 - - - - - - - - - - - - - - - - - -__________________~) 69 STEP 4 --------------------------------7) 70 A t o t t 18 x 3 STEP 2 Papert, S. "Teaching Children Thinking", M.LT. LOGO Memo #2, Oct. 1971. (2) Iverson, K.E. "APL in Exposition", IBM Tech. Report #320-3010, Jan. 1972. (3) Berry, p. et. al. "APL and Insight: The Use of Programs to Represent Concepts in Teaching", IBM Tech. Report #320-3020, March 1973. (1) NEXT HIGHEST MULTIPLE OF 10 1 r p t ? Continued from page 16 or registration run counter to this principle. At stake in this case is equal patent treatment for the products of small software companies. The myth perpetuated by the Government and CBEI\IA -- that computer-program embodied inventions are not machine inventions -- has been exploded; there is now no justification for the denial of patent protection to software-embodied machines. 20 ~ MODULO CHECK CHARACTER o ADAPSO - ? c FIGURE 4 o U For the meaning of the 29 references and for the rest of the brief, please ask ADAPSO for a copy of the printed brief. o COMPUTERS and PEOPLE for December 1975 C Computers and People: Case 1 IIStuart Universityll r Dr. Edward A. Tomeski Contributing Editor, "Computers and People" Fordham University Bronx, NY 10458 k Stuart University· was founded in the 1890s and has an enrollment of more than 10,000 full-time equivalent students and about 500 faculty members. t f c Administratively, the university consists of the board of trustees, the president, and vice presidents of academic affairs, research, financial affairs, student affairs, public relations, and planning. The various academic units are administered by deans and their assistants. Administration of Stuart, a private institution, has historically been relatively centralized and informal. Recently, there has been a gradual movement toward some decentralized decision-making as well as formalizing of policy and procedures. Long-range planning, budgeting, and institutional research are all receiving increased attention at Stuart. Overall, student enrollment has had some modest growth. but some specific educational programs have had serious declines in enrollment. The data processing center began operating in the late 1950s. mostly for academic uses in the areas of mathematics and science. At that time, the center was administered on a part-time basis by a faculty member. In the 1960s, the data processing center was placed under the supervision of a full-time computer specialist who reported to the Vice President of planning. Several full-time computer programmers were hired. In a few years the major use of the computer was for administrative applications (e.g., payroll, accounting, students' grades, registration records) rather than for academic work. In the early 1970s, a university computer committee was established; the committee contained representatives from administration and academic departments. The committee recommended the establishment of an integrated information system for the university. A systems task force was designated to design and develop such a system. The head of the task force, a fUll-time systems analyst, also reported directly to the vice president of planning. Two goals were set for the task force: 1. The design and development of two data bases; a student file and a faculty file. These would constitute the beginning of an integrated information system. 2. An attempt to develop a university simulation model to be used as an aid in predictive planning for the university. ';'Whilc based on an actual si tunti on, the case material has been slightly modified to conceal the identity of the institution. COMPUTERS and PEOPLE for December, 1975 From time to time "Computers and People" presents a capsule case which illustrates practical problems and issues related to computer technology and its use in organizations. A case includes questions. Readers are invited to compose their answers to the questions and, if they wish, mail them to Dr. Tomeski before the 10th of the month following the month of publication. In a subsequent issue each case will be discussed and selected responses by readers will be printed, along with a proposed solution by Dr. Tomeski. Recently, the use of the computer has been increasing in the academic areas for educational and research purposes. The data processing center, however, has a mandate to concentrate most of its time on administrative areas and the integrated information system. Consequently, there have been increasing complaints from faculty that educational technology is being neglected, and that such neglect harms the quality of the university education and research effort. Some professors use outside computers, because the university's computer is either inadequate for larger problems or the response time is poor. Because of the increase in operating costs (e.g., faculty salaries, fuel bills) and economic uncertainty, the university is operating under a very tight budget. Questions: 1. From the information available, do you think the faculty complaints appear justified? What can the faculty do to alleviate the problem? 2. What are the dangers, to the university, if more computer power is not made available to academic and research users? 3. What is your assessment of the university computer committee and its role related to the data processing center? Can you reconcile the responsibilities of the vice president of planning, director of the data processing center, and the systems analyst who heads the systems task force? 4. What is the best way of balancing the center's service between the administrative and academic users of the university? 5. What actions would you take if you were the vice president of planning? 0 21 . Computer-Assisted Tutorials In College Mathematics J. L. Caldwell Dept. of Mathematics University of Wisconsin-River Falls River Falls, WI 54022 Douglas Polley Dept. of Mathematics University of Minnesota Minneapolis, MN 55455 "While operating the programs, the students showed a most unusual enthusiasm for quadratic formula and line problems." Many uses of computers in mathematics education are well known. We believe that our approach dif.· fers in important aspects from most standard uses. It is hoped that this note will encourage others to experiment with techniques similar to the one presented. Analyzing Student Answers The programs which the authors have designed and written were specifically intended to analyze the students' answers to computational problems. We call this approach tutorial (although this terminology is nonstandard) because the programs mimic the role of a tutor in the traditional sense. No new material is presented via the computer. We assume that the student has received instruction in basic formulae before using the programs. If the student responds incorrectly to problems generated by the program, the program analyzes the student's answers in an attempt to identify common errors. The first programs deal with quadratic equations and equations of straight lines. A program dealing with sums of rational functions is under construction. Programming Languages The programs were written in FORTRAN and implemented on a CDC 6400 computer, but other choices would serve well also. In particular, the size of the CDC 6400 is unnecessary because such programs are easily divided into subprograms. FORTRAN could be replaced, and in fact the programs are currently being translated into BASIC to premit their use on other time sharing systems. The use of an instructional dialogue language (IOL) would greatly facilitate the writing; but unfortunately the authors know of no IOL which has the capability of generating problems at random. Hopefully this void will soon be fi lled. The principal use of the programs has been by precalculus and linear algebra students at the University of Wisconsin-River Falls and the Minneapolis and Morris campuses of the University of Minnesota. In addition, several other members of the Minnesota Educational Regional Interactive Time-Sharing System (MERITSS) have been involved. Those readers desiring additional information about the programs are invited to write UWRF. Discovering the Source of a Student's Error Problems with Randomly Chosen Parameters The format of all the programs is the same. The student, seated at a teletype, receives a problem with randomly chosen parameters. The student then solves the problem and enters his solution. If his solution agrees with the computer's solution, then another problem is presented. If the student's solution is incorrect, the computer then works the problem incorrectly in several different ways, each time checking its answer against the student's. If a match is obtained, then the computer suggests that the student has made a certain error and asks him to try again. If none of the incorrect answers match the student's answer, then the computer will check the student's work step by step. For example, in the case of the quadratic equation program, the student is first asked "What did you get for A, B, C?" and then later "What did you get for B -4AC?" Fi nally, if the student does not enter the correct answer, he receives a detailed solution. (For over 90% of the problems we have checked thus far, the student has eventually entered the correct answer.) If a student requires detailed solutions to several problems, he is asked to contact the instructor. It was our intention to identify the source of a student's error as soon as possible with minimal interrogation of the student. This presents some interesting theoretical, as well as practical, questions. On the theoretical side, we may ask just how much can we tell about the source of the error based on our knowledge of the incorrect response, the correct response, and a knowledge of the technique being used. On the practical side, we have the considerations motivated by the following example of two incorrect solutions to the problem: "Find the equation of the line through the point (2, -3) wi th slope 2." II I y 3 2(x - 2) y 3 2x y 2x 4 y + 3 = 2(x - 2) y + 3 = 2x - 4 y = 2x - Reprinted with permission from the" American Mathematical Monthly", October, 1975 22 COMPUTERS and PEOPLE for December, 1975 J. In I the mistake occurs in the first line, while in II the error is in the subtraction of the last line. In both cases the answer given is the same. Although the existence of the error can be readily identified, and it may be reasonable to assume that any incorrect answer of the form y = 2x - 1 is due to one of these methods, we still cannot tell which is the case. In programming the response to this situation we may issue a message of the form "I think you computed y - y. incorrectly, or perhaps you combined terms incorrectly." Alternatively, we may inquire "What did you get for y - y, ?" While the latter choice is less ambiguous, it is more difficult to program because it involves additional decisions. In situations where the error is not among those errors deemed most likely to occur, it may be acceptable to respond in the former manner. System Design Considerations For those who want to develop a series of integrated tutorial programs there will be some additional system design considerations. One problem is how to allow a student to progress through problems of varying levels of difficulty. One possibility is to have a level indicator which determines the difficulty of the problem generated as well as the details of the interrogation of the student. In the case of a student who has made several mistakes we would assign a lower number and ask him to enter his work a step at a time. For a student who is not making many mistakes we would not ask for as many intermediate steps and give more opportunities to correct mistakes before we present the solution. Another item of some import will be a series of software routines for such things as reading student input (e.g., polynomials) and extracting relevant data. Other such routines might include a means for comparing algebraic expressions to determine if they are equivalent (see Uttral [6]). Of course, once such routines have been written they can serve a large number of tutorial programs. Immediate Individualized Help We believe that this approach is a valid utilization of computer facilities because it offers immediate, individualized help to students in a manner that can be duplicated only by actual consultation with an instructor. The advantage to the student is a source of immediate feedback which might not be available if he had to compete with other students for help from the instructor. The advantage to the instructor is more time to deal with conceptual problems which are basically computational in nature. Experience in Developing the Programs Another benefit of a system of tutorial programs is the experience gained in developing them. The authors are currently having senior mathematics education students create additional programs because we believe that they will thus obtain a better understanding of the errors a student may make and also develop a facility in explaining the material. The student designer will, of course, learn much in the area of system programming. Enthusiasm Our experience with programs developed so far has indicated that there is considerable potential in this type of computer-assisted instruction, particularly at the college algebra level. The manipulative nature of many of the topics in college algebra (such as determinants, systems of equations, etc.) makes them suitable for the problem and answer analysis framework. Programs in this area would also provide review material for calculus students whose problem-solving techniques need improvement. In response to a questionnaire. students who have used existing programs indicated they considered the process most helpful and would recommend it to their fellow students. They also expressed a willingness to try new programs when they become available. While operating the programs. the students showed a most unusual enthusiasm for quadratic formula and line problems. It was most encouraging to see the students' satisfaction in obtaining the correct soltions with the assistance of the computer. For these reasons the authors hope that this approach will be expanded and improved. References I. E. D. Koffman, A generative CAl tutor for computer science concepts, AFIPS Conference Proceedings, 40, 1972. Spring Joint Computer Con., p. 379. 2. H. A. Lekan, Index to Computer Assisted Instruction, Harcourt. Brace. Jovanovich. New York. 1971. 3. A. W. Luehrmann. Should the computer teach the student, or vica versa?, AFIPS Conference Proceedings, 40, 1972. Spring Joint Computer Con., p. 407. 4. W. Stenberg, Computing in the high school -past present and future -- and its unreasonable effectiveness in the teaching of mathematics, AFIPS Conference Proceedings, 40. 1972. Spring Joint Computer Con., p. 1051. 5. P. C. Suppes. M. Jerman, D. Brian et al., Computer Assisted Instruction: Stanford's 19651966 Arithmetic Program. Academic Press. New York, 1968. 6. W. R. Uttral. Reaction paper. Computer Assisted Instruction and the Teaching of Mathematics, National Council of Teachers of Mathematics, Inc., 1969. Reduction in Teletype Time We feel that this approach has advantages over the setting in which the entire course is presented via the computer. First there is a reduction in the teletype time required because the student first attends class or perhaps studies a programmed text, then comes to the computer to work problems. Even more teletype time can be saved if our system is modified by assigning to the students problems that are stored in the "computer. Then the student would come to the computer only with problems he could not work. (Minimizing teletype time is important because it is often more scarce than computer time.) A second advantage is that tutorial programs are compatible with different presentations of the course material, thus leaving more control in the hands of the individual instructor. COMPUTERS and PEOPLE for December, 1975 o 23 TIl( infc inpi Computing and Data Processing Newsletter COl 1(J COMPUTER "SCENARIOS" FOR THE APPLICATION OF PESTICIDES BEFORE THEY ARE APPLIED COMPUTER MONITORS PRESCRIPTIONS AND HELPS PREVENT ADVERSE DRUG REACTIONS Robert Silber Dept. of Information Services Michigan State University East Lansing, Mich. 48824 Ken Fleming Executive Assistant for Public Affairs Group Health Cooperative of Puget Sound 200 - 15th Avenue East Seattle, WA 98112 Biological and computer scientists at Michigan State University are going to attempt to head off ecological and environmental crises before they start. They will develop computer "scenarios" of the expected future effects of pesticide applications. They are funded by a $360,000 grant from the federal Environmental Protection Agency. Under the general management of Pesticide Research Center at MSU, a research team of biologists, a group of systems scientists and pesticide experts will examine the environmental impact of 12 of the most commonly used "soft" pesticides. Dr. Erik Goodman, assistant professor of Electrical Engineering and Systems Science will head the group. . Soft pesticides -- usually organic phosphorous and carbamate compounds -- are generally considered safer by environmentalists because of their relatively rapid breakdown to nontoxic compounds. But in nature, things are rarely simple and loss of toxicity in the laboratory doesn't mean that a chemical will behave identically in the field. Even transient toxicity can have long-term detrimental effects in an ecological system. Temperature, humidity, or the activity of bacteria and fungi can drastically alter the persistance of a pesticide. To forecast the effects of an application, these and a number of other variables should be, but rarely are, taken into account. The characteristics of an ecosystem -- its geographic location, the kinds of animals and plants in it, its physical and chemical properties -- all can have tremendous i~fluence on the effects of a given ~esti cide. A chemical application having minimal side effects in a northern forest, could be disasterous to shellfish living in waters adjacent to a southern farm field. Because the ecological consequences of an improper chemical application can be severe, and because there are so many variables to consider, we need computer simulations to handle efficiently all the information relevant to rational decisions. With many scientist contributing information from many places, solving such a problem resembles working on a jigsaw puzzle without being sure of having all of the pieces. Computer models will help direct future research by putting available information in perspective, allowing scientists to identify information gaps and to establish relevant research goals. 24 2S Cal 2~ Prescription drugs offer remedies for almost everything from circulatory disease to headaches, these same drugs can pose hazards if taken in the wrong combinations. The average adult today consumes thousands of doses of medication a year. Tranquilizers, antacids, aspirin, antibiotics, cold remedies -- the list is long and diverse. 2! COl We know of at least 17,000 documented drug interactions with other drugs, foods, miscellaneous substances, conditions and circumstances. Many of these interactions are harmless; others can produce symptoms requiring treatment, or even endanger life. 2' It costs an estimated $2 billion a year to treat people in the United States suffering adverse drug reactions. Nearly 20 per cent of all hospital days in the nation are devoted to care of these patients. To help prevent these mishaps, Group Health Cooperative has installed a computer system to monitor more than one million prescriptions issued yearly. Co, l' The Co-Op is a prepaid health care provider. and has m6re than 200,000 m~mbers in the Puget Sound area and a medical staff of 200. It operates a major hospital and ten neighborhood medical centers, each with its own pharmacy. Patient profiles, listing the medication history, drug allergies and chronic illnesses of all GHC patients, are stored in a central computer. Another file lists all pharmaceuticals in stock. their chemical formulations, side-effects and interaction problems, if any. This information is instantly accessible by means of remote TV-like computer terminals in the outlying pharmacies. When a Co-Op member presents a new prescription, the pharmacist enters the patient's name and number into the system, which then scans the appropriate medication history. If the drug prescribed will react negatively with those the patient already is taking -- including patent medicines -- the computer . automatically stops the process and indicates that the prescription should not be filled. If the patiCOMPUTERS and PEOPLE for December. 197G Co ." Co 2 'tarnation ent's computer record shows an allergy to the medication, or one of its ingredients, the system displays this information on the remote terminal screen. In either case, the pharmacist then contacts the prescribing physician and requests alternative therapy. For example, if a person is allergic to penicillin, the doctor will prescribe a different type of antibiotic drug. But if this substitute should contain some form of penicillin, the computer will halt the prescription-filling process and alert the pharmacist. The effects of certain antibiotics can be nullified if taken in combination with food or antacids. If a Group Health Cooperative member regularly takes antacids, this fact will be noted in his computer record. When this patient presents a prescription for an antibiotic, the computer will alert the pharmacist who. then advises the patient how to avoid the interaction. [A] [F] [A] [A] To deal with another situation, the computer system will reject a prescription for a sugar-based cough syrup, if that should be ordered inadvertently for a diabetic. If no problems appear when the patient's profile is scanned, the new prescription is added to the record and a label is automatically printed. The system includes a data acquisition and processing system containing a minicomputer and 31 transducers which sense voltage and current flow in the feeder circuits to all the campus buildings. The computer scans the transducers once per minute to take a new set of readings. l~ese transducers are situated in the central, high voltage distribution cubicles, each of which suppliesa single large building or several small buildings. Signals from the transducers are conditioned by a scaling device. Then they travel over both campus and dedicated telephone company lines through an analog-to-digital converter and finally arrive at the computer. In real time, the computer generates displays of energy use in each of the 25 cubicles. The displays are monitored by a console in the plant engineer's office, and displayed data is also stored on one of two disc drives. Later, the displays are plotted offline on a digital plotter, and graphically display patterns of energy use over periods of a day, a week, or a month. A teletype is also available for producing data tabulations and for program development entries and output. The system does not replace the trained pharmacist or physician, but it serves as a major aid in dispensing the most effective and safe medications. At the same time, it reduces the tedious chores which pharmacists and their assistants would have to perform by hand. The Berkeley system is being used to examine the two main factors which go into the calculation of the institution's monthly bill -- energy demand and energy usage. Demand represents how much energy the campus may require at any given moment, while the power or energy used is, of course, the summation for a given time period. All pharmacies in the State of Washington soon will be required to maintain medication profiles on regular consumers. The Cooperative's computer system will keep these records, ensuring compliance with the new ruling and conserving thousands of hours of pharmacists' time -- time that would have been spent on maintaining manual records. High demand peaks occur at the university when several experimental apparatus such as the main campus' wind tunnel, small nuclear reactors, and plasma experiments are turned on simultaneously and superimposed on the ordinary "background" loads such as lighting, heating, cooling and continuously-run experiments. Another benefit of the system is that the computer is programmed to monitor the drug inventory. So the size of the inventory can be reduced, and costs cut, without fear of sudden exhaustion of stock. The system will generate reorders when quantities are low. A high demand peak pays a heavy penalty. To help defray the costs of turbines, generators and transmission lines necessary to meet the highest peaks which may arise, no matter how short their duration, the Pacific Gas and Electric Company (PG & E) incorporates peak demand into the billing equation very significantly. The newly-installed computer system will save money and, in addition, provide better service to the CO,Op members, making a larger contribution to their good health. The computer used is an IBM System 370 Model 125. MINICOMPUTER HELPS CUT UNIVERSITY'S ELECTRIC BILLS John Kane Hewlett Packard 1501 Page Mill Road Palo Alto, CA 94304 [N] While itself consuming no more energy than a room air conditioner, the system monitors more than 20 megawatts of power used in 75 buildings on this campus. The Lawrence Berkeley Laboratory is separate electrically and accounts for another 20 megawatts. Administrators at the University of California at Berkeley have installed a minicomputer system to monitor the use of about $125,000 per month worth of electrical energy. The system is helping facility managers here discover exactly where and how power is consumed and how best to reduce the large monthly bi 11. COMPUTERS and PEOPLE for December, 1975 In charging for peaks in demand, PG & E employs what is called a "ratchet effect", whereby the highest peak occurring during any half-hour period for the month is carried forward in calculating the next II monthly bills, or until a new half-hour peak is registered in some succeeding month. This ratcheted peak is averaged-in with each month's actual peak. As an example, suppose a three-megawatt peak over and above the normal demand for a half-hour period is recorded but never repeated again. At present demand costs -- about $1800 per megawatt -- this amounts to $5400 extra for the first month and $2700 for the next 11 months for a total cost of $35.100 for the year for that one peak. Facility managers are taking aim at these costly peaks in demand. They are beginning to knock them down by a notch or two through using the minicomputer system to observe their occurrence. 25 A lamp removal program is underway to eliminate all unnecessary lamps while still providing illumination required for a practical environment. A program designed to upgrade lighting fixtures to diffuse light more efficiently has begun. Also, a scheduling program is being set up whereby experiments requiring substantial amounts of electricity are staggered, avoiding simultaneous use wherever possible and utilizing evening and weekend time periods when background loads are lowest. A look at the pen plots generated by the computer for Moffitt Library demonstrates how revealing the detailed information on electrical demand can be. Analysis showed that most of Moffitt's load was the result of lighting rather than experimental equipments, machinery, or HVAC systems. Examination of the plots also revealed two unaccounted for and costly afternoon demand peaks, two weeks apart. A check of weather conditions (the weather bureau hai a station on campus) showed these were exceptionaily warm winter days and air conditioning units were turned on. The 100 kw air conditioning units operate automatically for Moffitt from sensors located outdoors. The building's extensive fluorescent lighting provides all the heat necessary on most days. Facilities managers concluded that by turning off 50 percent of the lights on warm days, the air conditioners needn't be used as often. This was accomplished without impairing normal use of the building. The monitoring of load peaking will have other benefits as well. The system functions as a maintenance tool for electricians. On the console, feeder lines can be identified and instantaneous readings of voltage and current can be taken. This permits electricians to find overloaded lines and switch loads, preventing individual transformers and cables from taking the brunt of the load, which shortens their productive lives. The system installation was very inexpensive. The transducers cost about $30 each; there was little special wiring necessary. Each of the 31 monitoring points cost about $150 to install completely. The monitoring system should pay for itself in two years. If so, the saving in monthly electric bill would be more than 10 percent. view, test, evaluate, and distribute the best available computer-based materials for classroom use in the physical and social sciences. This activity will require establishing quality standards for materials; it also requires the development of mechanisms for delivering materials to instructors. The grant is from the Technological Innovations in Education Group of the National Science Foundation; it will enable CONDUIT to continue work on the development of procedures, techniques, standards and systems for disseminating complex computer-based instructional packages. In addition, CONDUIT will assemble panels of experts to provide state-of-the-art reports on instructional computing in the fields of chemistry, physics, economics, biology, mathematics, sociology, geography, political science, business and psychology. CONDUIT was founded in 1972 to study and promote the exchange of computer-based instructional materials. The original members of the CONDUIT consortium were Dartmouth College. North Carolina Educational Computing Service, Oregon State University, The University of Iowa. and the University of Texas, Austin. The project will be expanded this year with the inclusion of 10 new members in the consortium. The use of the computer to provide new and exciting techniques for learning has become much more feasible because of dramatic decreases in equipment costs. But the real effectiveness of the new technology depends on the dissemination of ideas on the use of computers in education. The main job of CONDUIT is to assure that the best ideas, some of which currently pass unnoticed, are widely dissemi nated and adopted. 0 3. FAEOUENCYM:n~:~~ 4. LOCATION OF KNOWN OFFtCEOf PUBLICATION (8"...1. !~~=SW;;::PA$~ .50 NAMES AND ADDRESSES OF PUBLISHER, EDITOR, AND MANAGING EDITOR Edmund C. Berkeley. 615 Washington St .. Newtonville. Mass. 02160 EDITOR (Na". .....ndaddn .., Same MA.NAGING EDITOR (Nam.gnd addNU) Same 7. OWNER (If OUlII.. d by a corpo""io... It. IIG_ .1141 ~ '"'"' k ""ted .tlef ""0 (mmecllat.ly ,h .. Nund..,. 'hI' "ll'Inl" .,nd addn.... o( "ocArhald..... ownin, 01' holdln, J pl'rt:l'n' or mo", of fo'" _au"f of doell. " "ot owned by • corporaHon, fh. "om .. o"d Gddre,H" of Ihe ~~~~ ownl/a b)l II pcvtrwrMlp or 0""." Itllincorporatl/d fl~m. It. 110m. AIId oddreu • .. _II .. th.d of .och of New Yor~~~LW.a.Sh'~ntnn~;, James J. CrYan Ed Burnett News Service The University of Iowa 700 Jefferson Building Iowa City, IA 52242 Fore go ZIP cOlI" IN., prin,.,..,j PUIILISHER /N ........"d..Jd ..... } Indi ... lduol owne", ",ud be 'I....... " PROMOTING THE USE OF A COMPUTER IN TEACHING cit", COlI"",. "ar. IPId 615 Washington St.. Newtonville. Middlesex County. Mass. 02160 N. M. W:.' n?"n 33 Sandra "ane. W.vn. N.T n747n 40 Eas' to St Npw Ynrk. NY 10003 8. KNOWN BONDHOLDERS, MORTGAGEES, ANO OTHER SECURITY HOLDERS OWNING OR HOLDING 1 PERCENT OA MORE OF TOTAL AMOUNT OF BONOS MORTGAGES OR OTHER SECURITIES I the", 0"' "anI!' .odoll!' 9. FOR OPTIONAL COMPLETION BY PUBLISHERS MAILING AT THE REGULAR RATES (Section 1:12.121, Polloi S.MJice Man!lal! The University of Iowa has received a National Science Foundation grant of $375,000 so that it can serve as a center for the review, testing and dissemination of selected computer-based materials for college science courses. The project is being carried out by CONDUIT, a consortium of eight educational computer networks directed by James W. Johnson of The University of Iowa Computer Center. The main objective of CONDUIT is to improve education by providing for instructors and students alternative ways of learning concepts and methods. Because of the newness of the use of computer technology in education, structures to effectively disseminate innovations do not now exist. The IS-month grant will provide support for the CONDUIT central office on the U of I campus to re- 39 U. S, C. 3626 provid •• In pe,t,n.nt pe": "No peraon who would hMld ~n ontltlOd 10 mart mener undor former "c1ion 4359 of th •• 1itle :::~~I:I:~ ·t~c':n:":;,.:n:; ;~·.ur:::e~,:~lded undor thl, lIU~on un ........ fil" ."n!llily .... 111'1 tho Pottl' Sorvlco ..... ri1t11n'.qu.ufor !;t=~~:::~:I: :~~~;~:.:r~~I~;n~.o~, ~.i~:~~U10, 1"IIby Nqueft permlalon 10 meil tho pubilcetion nemed In It.", 1 at 1ho r.duced po.11190 j 10. ~~~u;?~~::~~~ BY NONPROFIT OAGANIZATIONS AUTHORllEOTO MAIL AT SPECIAL AATES (Sl!'rtioli 132.122 PDfla! Sl!'roiC"'1!' AVERAGE NO. COPIES P~:gE~~DtY~~~~S 6350 5800 5326 4283 5326 4283 B. PAID CIRCULATION 1. SALES THROUGH OEALERS ANO CARRIERS, STREET VENOORS ANO COUNTER SA LES O. FREE DISTRIBUTION BY MAIL, CARRIER OR OTHER MEANS SAMPLES,COMPLIMENTARY,AND OTHER FREE COPIES E. TOTAL OISTRIBUTION (SUi'll ofC.1Id DJ F. COPIES NOTOIliTRIBVTED 1. ~~~~CRE ..":.~T~~~·OVER. ~tr9;'s 3526 (Page 1) 100 100 5428 4383 .-----1---..::..:.:"'-----+---------1 UNACCOUNTED, SPOILED I cerJ:ify that the statements made by me above are I andcolnplete. 26 I .... ~•.;:~:~gh.,.,blt'ino.. ",an...... or_"""J correct ~ ". 922 1417 6350 5800 ~I~~~J~~~E OF EOITO~ ... U:LI:EfII, BU51,..F.SS ""A,..AO(;"'. t:~ C'.~ (See inJtructiollJ on f'n't.'neJ I .cOMPUTERS and PEOPLE for December, 1975 .... GAMES AND PUZZLES for Nimble Minds - and Computers Neil Macdonald Assistant Editor I It is fun to use one's mind, and it is fun to use the artificial mind of a computer. We publish here a variety of puzzles and problems, related in one way or another to computer game playing and computer puzzle solving, or to the programming of a computer to understand and use free and unconstrained natural language. We hope these puzzles will entertain and challenge the readers of Computers and People. I . NAYMANDIJ NUMBLES In this kind of puzzle an array of random or pseudorandom digits ("produced by Nature") has been subjected to a "definite systematic operation" ("chosen by Nature") and the problem ("which Man is faced with") is to figure out what was Nature's operation. A "definite systematic operation" meets the following requirements: the operation must be performed on all the digits of a definite class which can be designated; the result displays some kind of evident, systematic, rational order and completely removes some kind of randomness; the operation must be expressible in not more than four English words. (But Man can use more words to express it and still win.) A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns, or deliberate (but evident) misspellings, or is otherwise irregular, to discourage cryptanalytic methods of deciphering. NUMBLE 7512 NA YMANDIJ 7512 / 142 1 346 2 6 7 2 5 493 7 3 201 1 5 9 7 5 3 9 088 6 243 5 331 3 2 7 5 8 6 8 6 028 962 1 879 1 048 5 0 1 8 1 4 3 1 291 9 594 9 5 709 3 6 5 766 7 028 032 2 008 244 738 9 2 4 8 6 7 5 4 7 3 6 4 7 4 6 1 6 744 2 6 2 7 6 6 7 7 4 2 2 5 432 1 1 5 099 6 0 3 0 088 2 8 2 3 304 2 4 8 868 7 1 604 2 7 364 6 5 745 3 2'9 2 3 2 7 5 3 9 5 8 4 1 1 8 H E WHO x M T E W E S L L S W T OMKTW 90685 36549 06851 3254 We invite our readers to send us solutions. Usually the (or "a") solution is published in the next issue. MAXIMDIJ In this kind of puzzle, a maxim (common saying, proverb, some good advice, etc.) using 14 or fewer different letters is enciphered (using a simple substitution cipher) into the 10 decimal digits or equivalent signs for them. To compress any extra letters into the 10 digits, the encipherer may use puns, minor misspellings, equivalents like CS or KS for X or vice versa, etc. But the spaces between words are kept. SOLUTIONS NA YMANDIJ 7511: Make row 3 even. MAXIMDIJ 7511: If it is different, it is rong. NUMBLE 7511: People learn by losing and losing. MAXIMDIJ 7512 (D~CD*
Source Exif Data:File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.3 Linearized : No XMP Toolkit : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37 Producer : Adobe Acrobat 9.1 Paper Capture Plug-in Modify Date : 2009:03:25 03:36:05-07:00 Create Date : 2009:03:25 03:36:05-07:00 Metadata Date : 2009:03:25 03:36:05-07:00 Format : application/pdf Document ID : uuid:b32bab6a-18d6-405f-ba0c-0cc0a6788af7 Instance ID : uuid:6ce582d1-abeb-4c41-b9bb-5287f0488299 Page Layout : SinglePage Page Mode : UseNone Page Count : 28EXIF Metadata provided by EXIF.tools