197803

197803 197803

User Manual: 197803

Open the PDF directly: View PDF PDF.
Page Count: 28

Download197803
Open PDF In BrowserView PDF
computer's
.

and people

March, 1978
Vol. 27, No.3
formerly Computers and Automation

NEW SPERRY UNIVAC CONFERENCE CENTER IN EUROPE

The Japanese Economic Challenge: Is There Equity?

- E. Flqyd Kvamme

Technology Transfer in Transition

- W. S. Anderson

The Police Information Network of New York State

- R. Nathanson

Spelling and Reading English Phonetically: Gradual Change
Accomplished by Computer, and the "Soundspel" System

- Edward Rondthaler

The Notebook on
COMMON SENSEI ELEMENTARY AND ADVANCED
is devoted to development, exposition, and illustration of what
may be the most important of all fields of knowledge:

WHAT IS GENERAllY TRUE AND IMPORTANT

+

+

+

JUDGEMENT
AND
MATURITY

+

PURPOSES:
to
to
to
to
to
to
to
to
to

help you avoid pitfalls
prevent mistakes before they happen
display new paths around old obstacles
point out new solutions to old problems
stimulate your resourcefulness
increase your accomplishments
improve your capacities
help you solve problems
give you more tools to think with

8REASONS TO BE INTERESTED IN THE FIELD OF
COMMON SENSE, WISDOM, AND GENERAL SCIENCE

+

SCIENCE
IN
GENERAL

+

+

AVOIDANCE
OF
LOGICAL
FALLACIES

+

TECHNIQUES
FOR
SOLVING
PROBLEMS

Topic:
THE SYSTEMATIC
PREVENTION OF MISTAKES

Topic:
SYSTEMATIC EXAMINATION
OF GENERAL CONCEPTS

Already Published
Preventing Mista kes from:
Failure to Understand
Forgetting
Unforeseen Hazards
Placidity
Camouflage and Deception
Laxity
Bias and Prejudice
Ignorance

Already Published
The Concept of:
Expert
Rationalizing

To Come
Preventing Mista kes from:
Interpretation
Distraction
Gullibility
Failure to Observe
Failure to Inspect

+

Feedback
Model
Black Box
Evolution
Niche
Understanding
Idea
Abstraction

To Come
COMPUTERS are important Strategy
But the computer field is over 25 years old. Here is a new
Teachabie lVIoment
field where you can get in on the ground floor to make
Indetermi nacy
your mark.
System
MATHEMATICS is important Operational Definition
But this field is more important than mathematics, because
common sense, wisdom, and general science have more
applications.
. . - - ...•.....•.. (may be copied on any piece of paper) ....................... ,
LOGIC is important To: Berkeley Enterprises, Inc.
But this field is more important than logic, because common,
815 Washington St.: Newtonville: MA 02160
sense plus wisdom plus science in general is much broader
. ( ) Yes, please enter my subscription to The Notebook on Common
than logic.
Sense, Elementary and Advanced at $12 a year (24 issues), plus
WISDOM is important extras. I understand that you always begin at the beginning
This field can be reasonably called "the engineering of
and so I shall not miss any issues.
wisdom".
)
Please
send me as free premiums for subscribing:
COMMON SENSE is important This field includes the systematic study and development of: 1. Right Answers - A Short Guide to Obtaining Them 4. Strategy in Chess
2. The Empty Column
5. The Barrels and the Elephant
common sense.
3. The Golden Trumpets of Yap Yap
6. The Argument of the Beard
SCI ENCE is important ( ) I enclose $
) Please bill my organization
This field includes what is common to all the sciences, what:
RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY
is generally true and important in the sciences.
HOW CAN YOU LOSE?
MISTAKES are costly and to be AVOIDED Name ____________________________ Title _______________
This field includes the systematic study of the prevention of:
mistakes.
MONEY is important The systematic prevention of mistakes in your organization
might save 10 to 20% of its expenses per year.

Organization, ____________________________--'--___________
Address (including zip) __________________________________
Signature _____________________

Purchase Order No. _____

"RIDE THE EAST WIND:

Parables of Yesterday and Today"

by Edmund C. Berkeley, Author and Anthologist
Published by Quadrangle/The New York Times
Book Co., 1974, 224 pp, $6.95

Missile Alarm from Grunelandt

The Fly, the Spider, and the Hornet
Once a Fly, a Spider, and a Hornet were trapped inside a window
screen in an attic. For several hours they walked up and down, left
and right, here and there, all over the screen. They could look through
the screen at the summer woods, feel the summer breezes, and smell
the summer smells; but they could not find any hole to pass through
the screen to the woods and fields so tantalizingly close, yet so far
away.
Finally they decided to hold a conference on the problem of getting through the screen. The Fly spoke first, and said, "My Colleagues, ....

The Fox of Mt. Etna and the Grapes

Once upon a time there were two very large and strong countries called Bazunia and Vossnia. There were many great, important, and powerful leaders of Bazunia who carefully cultivated an
enormous fear of Vossnia. Over and over again these important
and powerful leaders of Bazunia would say to their fellow countrymen, "You can't trust the Vossnians." And in Vossnia there
was a group of great, important, and powerful leaders who pointed
out what dangerous military activities the Bazunians were carrvioo
on, and how Vossnia had to be militarily strong to counteract
them. The Bazunian leaders persuaded their countrymen to vote
to give them enormous sums of money to construct something
called the Ballistic Missile Early Warning System, and one of its
stations was installed in a land called Grunelandt far to the north
of Bazunia.
Now of course ballistic missiles with nuclear explosives can fly
any kind of a path all around a spherical world, and they do not
have to fly over northern regions. But this kind of reasoning had
no influence on the leaders of Bazunia who wanted the money
for building BMEWS. Nor did it have influence on their countrymen, who were always busy" trying to make money - in fact
often too busy to think clearly .•..

52 parables (including fables, anecdotes, allegories)
23 never publ ished before
27 authors
18 full-page illustrations
330 quotations and maxims

Once there was a Fox who lived on the lower slopes of Mt. Etna,
the great volcano in Sicily. These slopes are extremely fertile; the
grapes that grow there may well be the most delicious in the world;
and of all the farmer!\ there, Farmer Mario was probably the best.
And th is Fox longed and longed for some of Farmer Mario's grapes.
But they grew very high on arbors, and all the arbors were inside a
vineyard with high walls, and the Fox had a problem. Of course, the
Fox of Mt. Etna had utterly no use for his famous ancestor, who
leaping for grapes that he could not reach, called them sour, and
went away.

7 Parts: The Condition of Man / On Flattery and
Persuasion / On Perseverance and Resourcefulness /
Behavior - Moral and Otherwise / The Problem
of Truth / On Common Sense / Problem Solving

The Fox decided that what he needed was Engineering Technology. So he went to a retired Engineer who lived on the slopes of
Mt. Etna, because he liked the balmy climate and the view of the
Mediterranean Sea and the excitement of watching his instruments
that measured the degree of sleeping or waking of Mt. Etna. The
Fox put his problem before the Engineer ....

JUDGE FOR YOURSELF AT NO COST

The Fire Squirrels
Scene: Two squirrels, a young one named Quo, and an older one
named era-era, are sitting by a small campfire in a field at the edge
of a wood. Behind them hung on a low branch of a tree are two
squirrel-size hammocks. Over each of the hammocks is a small canopy that can be lowered to keep out biting insects. It is a pleasant
summer evening,' the sun has just recently set, and the stars are coming out: - QuO: Cra-Cra, you know I don't believe the old myths any more.
Tell me again how it really happened.

Cra-Cra: Just this: we received our chance because they dropped
theirs. It is as simple as that.
01,J0: In other words, they were the first animals to use tools,
a nd we are the second?
era-era: Yes. There is a mode of surviving in the world ....

THE VALUE OF THIS BOOK TO YOU
CAN BE VERY GREAT

RETURNABLE IN 10 DAYS FOR FULL REFUND
IF NOT SATISFACTORY
You can read it all in 10 days - and keep it only if
you think it is worth keeping.

HOW CAN YOU LOSE?
- - I
I To:
I

-

(may be copied on any piece of paper) -

I

Please send me
copy (ies) of Ride the East Wind:
I enclose $7 .00 ~py (includes handling).

Berkeley Enterprises, Inc.
815 Washington St., S9, Newtonville, MA

Total enclosed _ _ _ __
My name and address are attached.

- - - - - 02160

(Prepayment is necessary)

Vol. 27, No.3
March, 1978
Editor and
Publisher
Assistant to
the Publisher
Assistant
Editors

Neil D. Macdonald
Kathy P. Flanagan
K. Kaufmann

Software
Editor

Stewart B. Nelson

Editorial
Board

Elias Awad
Malcolm H. Gotterer
Theodore C. Willoughby

Contributing
Editors

Grace C. Hertlein
Richard E. Sprague
Edward A. Tomeski

London
Co"espondent

Thomas Land

Advisory
Committee

Ed Burnett
James J. Cryan

The Computer Industry and Challenges
7 The Japanese Economic Challenge: Is There Equity?
by E. Floyd Kvamme, Vice President, National Semiconductor Corp., Santa Clara, Calif.
Japan maintains a protection over Japanese industries
and employees, and conducts international competition
in what is essentially a protectionist pattern. The outlook for U.S. semiconductors and computers is therefore
dim but should be brighter.
10 Technology Transfer in Transition
by W.S. Anderson, Chairman, NCR Corp., Dayton, Ohio
The gap between developed and developing countries
becomes narrower through the process of technology
transfer, including computers, but the problems of
equity that technology transfer brings, before transfer
patterns are cemented by precedence and tradition, require study and solution now.

[A]

[A]

Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, MA 02160
(617) 332-5453

The Publisher
Berkeley Enterprises, Inc.
815 Washington St.
Newtonville, MA 02160
(617) 332-5453

"Computers and People," formerly
"Computers and Automation," is published
monthly, 12 issues per year, at 815 Washington St., Newtonville, MA 02160, by Berkeley Enterprises, I nco Printed in U.S.A.
Second Class Postage paid at Boston, MA,
and additional mailing points.
Subscription rates: United States, $11.50
for one year, $22.00 for two years. Canada:
add $1 a year; elsewhere, add $6 a year.
NOTE: The above rates do not include
our publication "The Computer Directory
and Buyers' Guide." If you elect to receive
"The Computer Directory and Buyers'
Guide," please add $12.00 per vear to your
subscription rate in U.S. and Canada, and
$15.00 elsewhere.
NOTE: No organization in Switzerland
or Morocco is authorized or permitted by
us to solicit subscriptions for or receive
payments for "Computers and People" or
"The Computer Directory and Buyers'
Guide." Such subscriptions and payments
should be sent directly to us.
Please address mail to: Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160.
Postmaster: Please send all forms 3579
to Berkeley Enterprises, Inc., 815 Washington St., Newtonville, MA 02160.
© Copyright 1978, by Berkeley Enterprises, Inc.
Change of address: If your address changes, please send us both your new address
and your old address (as it appears on the
magazine address imprint), and allow three
weeks for the change to be made.

4

formerly Computers and Automation

Judith P. Callahan

Grace C. Hertlein

Advertising
Contact

and people

Ed mund C. Berkeley

Art Editor

Editorial
Offices

computers

1, 5, 24 Continued Growth for the Computer Industry
[N]
by Gerald G. Probst, President, Sperry Univac, Blue Bell, PA
In 1978 computer shipments are expected to increase by
16 percent; and bubble memory, fibre optics, and voice
input and output are directions for research and development.
26 Suit Alleges Illegal Tie-In Between Banking and Data Processing
by Richard C. Reed, Statistical Tabulating Corp., Chicago, I L
A Chicago bank is alleged to be violating a federal law, by
requiring that computerized services be tied-in with payroll services, causing plaintiff to lose customers and making
it impossible for them to gain nevv ones.

[N]

Computers and English Spelling
19 Spelling and Reading English Phonetically: Gradual Change
[A]
Accomplished by Computer, and the "Soundspel" System
by Edward Rondthaler, Photo-Lettering, Inc., New York, NY
If the English language were spelled phonetically, 20 million
iiiiterate peopie in the U.S. wouid find speiiing and reading
far easier. Phonetically spelled texts could be translated
by computer into regularly spelled texts.

Computer Applications
14 The Police Information Network of New York State
[A]
by R. Nathanson, Racal-Milgo, Inc., Miami, Fla.
A computer terminal in the front seat of a police car? It's
happening now in the state of New York, where a statewide
computer and communications network "is provided for police
and "law enforcement agencies. And it works.

COMPUTERS and PEOPLE for March, 1978

The magazine of the design, applications, and implications of
information processing systems - and the pursuit of truth in
input, output, and processing, for the benefit of people.

Front Cover Picture

The new Sperry Univac International
Executive Centre offers a pleasant
environment for the presentation of
seminars on computers and management. See page 24.

24 Dartmouth Students Can Look for Jobs Via an Interactive
Computer
by Robert P. Graham, Dartmouth College News Service,
Hanover, NH
An interactive computer at Dartmouth provides a centralized source of information for local job seekers; so it
becomes unnecessary for every student to make the rounds
of all the potential employers in the community.

[N]

26 Computerized Laboratory Information System Brings Eight Per
Percent Revenue Increase to Iowa Hospital
by Patricia A. Conway, Control Data Corp., Minneapolis, MN
Two computer systems (one IBM, the other Control Data)
have been combined, and the cost of billing patients has
been markedly reduced.

[N]

101 MAXIMDIJES

[E)

Over 1DO amusing, easy, cryptographic puzzles .... with maxims,
quotations, sayings, etc., as the
answers .... with lists, tables, and a
guide for- solving speedily .... hours
of fun and entertainment for you
and your friends.

Design of Computer-Communication Systems
6 The Value of Timely Information - and Heavy Snowfall
by Edmund C. Berkeley, Editor
It is absurd to design information systems that cannot
handle unusual, heavy demands for access.

For your copy, send $1.80, plus
20 cents for postage and handling,
with your name and address to:

Computers, Games and Puzzles

Berkeley Enterprises, Inc.

27 Games and Puzzles for Nimble Minds - and Computers

[C)

by Neil Macdonald, Assistant Editor
MAXIMDIJ - Guessing a maxim expressed in digits.
NA YMANDIJ - A systematic pattern among randomness?
NUMBLES - Deciphering unknown digits from arithmetical
relations.

NOTICES

815 Washington St.
Newtonville, Mass. 02160

Key

1. The Computer Directory and Buyers' Guide for 1977 will be
entitled the 1977-78 Computer Directory and Buyers' Guide. We
hope and expect that it will be printed in March 1978. We regret
the delay, recently added to by heavy snowfalls in the Boston area.
2. Our subscription entry and renewal operations have been in disorder and disarray during the latter part of 1977. We hope and
expect that the conditions will be corrected and in proper order
by March 1978. If you are a subscriber, and you have failed to
receive any issues that you are entitled to, please let us know at
once what issues you are missing, and we will send them to you
as soon as possible.

E~d...C=.~~
Editor

COMPUTERS and PEOPLE for March, 1978

[A]
[C)

[E)
[EN]
[F)
[N]
[R]

Article
Monthly Column
Editorial
Editorial Note
Forum
Newsletter
Reference

NOTICE
*D ON YOUR ADDRESS IMPRINT
MEANS THAT YOUR SUBSCRIPTION INCLUDES THE COMPUTER
DIRECTORY.
*N MEANS THAT
YOUR PRESENT SUBSCRIPTION
DOES NOT I NCLUDE THE COMPUTER DIRECTORY.

5

Editorial

The

ValueoF

Timely InFormation
- And Heavy Snowfall

Until February 1978, I do not think that I ever
fully appreciated the value of timely information.
Information, knowledge, often has an exceedingly
great importance. Just as oracles were useful to
the ancients, so our current day oracles are useful
to us.
Two recent experiences have thrust upon me the
prodigious value of timely information. One was an
involuntary stay in and near Chicago's O'Hare Airport which lasted 53 hours on January 19 and 20.
Cause: a big snowfall in Boston. The other experience was an involuntary confinement without motor
car travel in the city of Newton which began on
Tuesday, February 7. At present wri ting (Saturday,
Feb. 11), it has endured five days. Cause: a much
bigger snowfall in the Boston area.
The tribal authorities of this society are making
appropriate tribal noises each day about lifting
"next day" the ban on travel which prevents almost
all workers from going to their place of business
in the morning and returning from it at night. But
the physical indications that I see are that the
Boston metropolitan area is a long, long way from the
kind of free travel that existed up until the middle
of Monday, February 6. At present writing, Otis St.,
where I live, which used to be wide enough for three
cars, is now only wide enough for one car. Also,
apparently all secondary streets in Newton are still
only wide enough for one car, with about four or five
feet high of solid, compacted snow banks on either
side.
Item: On Jan. 20 at about 6 a.m., a big planeload
of passengers due in Boston at 8 a.m. landed in Chicago because the Boston airport was closed. The
airline said "call this number to make further arrangements." After I reached emergency hotel accomodations, the number was busy, busy, busy, busy
more than 20 times and could not be reached. Frustration from lack of information (LOI).

called for permission for emergency travel. But the
number was busy, busy, busy, busy. More frustration
from LOI.
Item: Since the number was continually busy, I
drove, on Feb. 10, to the police station and stood
in line (half an hour's wait). I was refused permission to pick up some medicine at Newton-Wellesley
Hospital and return to my house a mile away. But
the Civil Defense and Red Cross would do it insteadl
So I drove my car back to my house illegally, subject
to a $500 fine and a year in jail. More frustration
from LOI.
Item: From my own observations, it is plain and
clear to me that all the single car lane passages
through the snow in the Boston area must become temporary one way streets, for there are ~either machines
nor money enough to restore them soon to two way
streets. However, there appears to be no recognition
by the tribal authorities that this could quickly
convert a very difficult situation into a much less
difficult one. More frustration, this time not from
LOI but from lack of common sense.
Information systems sometimes become heavily overloaded in crisis situations. A volume of input funnelled into an information system may become more
than ten times what it usually is. This kind of crisis input should be analyzed. A large part of a heavy
overload of input information could be handled by
common sense decisions made beforehand.
For example, instead of giving just a busy signal,
the system could describe to the person calling
how he can receive various kinds of messages, then
he could dial further numbers for furth~r information.
Only a relatively small amount of sensible planning to deal with heavy and unusual overloads would
reduce enormously the frustration coefficient of
customers.

Item: I returned from the hotel to O'Hare Airport.
I stood in line for an hour to find out when Boston
would probably open and on what planes I might go
there. I discovered that I had no standby ranking;
so I had lost four hours of ranking. I also found
that I had no precedence and that I could make no
reservation for flying out until late that night.
More frustration from LOI.
Item: I thought I was staying at "the" Holiday
Inn. I found out that there were over 20 Holiday
Inns in the O'Hare areal and that I did not know
which one was mine -- because the hotel key did not
have the name of the hotel on itl More frustration
from LOI -- so much for only 3 episodes of some dozen
in O'Hare Airport.
Item: In Boston on Feb. 9 I learned of a phone
number in the local police station that could be

6

COMPUTERS and PEOPLE for March, 1978

Edmund C. Berkeley
Editor

The Japanese Economic Challenge:

Is There Equity?
E. Floyd Kvamme, Vice Pres.

National Semiconductor Corp.
2900 Semiconductor Drive
Santa Clara, CA 95051

"This situation is intolerable to trade partners of Japan because it implies that a Japanese
worker has a larger right to employment than a worker in a competing American plant."

IMBALANCE IN U.S./JAPAN TRADE

Competition

I like competition. I like the semiconductor
business. We're a people business. We're a multinational business. Fundamental to business and competition is understanding the rules. My remarks in
this article will be based upon two premises: first,
that business within each country of the world should
be conducted in accordance with the laws of that
country and that trade between countries should respect those laws; secondly, that in the international
trade arena the developed countries of the world
should, according to expected norms, establish trade
policies which by and large result in balanced trade
with a balanced product mix.

24
22
~ 20

:3..J

18

g 16
~
~

o

14

12

:3

10

iii

8

--------------~~
U.S. EXPORTS TO JAPAN

6

Imbalance

When one considers U.S.-Japanese trade for the
past decade, however, balanced trade has not existed.
Figure 1 shows the imbalance in U.S.-Japanese trade
during the years 1974 through 1977, with the 1977
total being estimated at an $8 billion deficit. It
further goes on to show the currently forecasted imbalance in 1978 at approaching $10 billion. These
data alone, however, do not show the entire picture
in trade between the two countries. If we look at
the imports from industrialized countries into three
specific countries, the U.S., West Germany and Japan,
we see that Japan imports only 20% of their total
imports from industrialized countries. The United
States, on the other hand, imports 53% of its imports
from industrialized countries and West Germany's
industrialized imports are 66% of their total. Thus,
the pri~ary imports of Japan, which are expected to
roll up a- positive trade balance of $17 billion this
year, are in fact raw material or agricultural products. When one examines Japanese imports from the
U.S., only two items among the top ten could be considered manufactured goods; U.S. imports from Japan,
however, are overwhelmingly manufactured goods.
There is, therefore, a trade imbalance not only in
raw dollars but also from the standpoint of raw
material versus finished manufactured goods. In the
course of this discussion, I will utilize a number of
quotations from various Japanese individuals to demonstrate their views on the matters being discussed
Based on a talk at the Semiconductor Equipment and Materials Institute,
Palo Alto, Calif., December 1977.

74

76

75

77

78

Figure 1

here, and then comment on them from my point of
view.
A Planned Economy

First, what is the root of the basic problem?
The Japanese will argue that their economy is "not
a planned economy." /1/ Comparing Japan with the
United States would certainly lead one to refute
this contention. The Japanese government has:
1) Protected the Japanese internal market
from penetration by U.S. firms;
2) Provided direct financial assistance to Japanese firms;
3) Organized research and development on a joint
industry and government basis;
4) Given liberal tax concesEions for export trade;
5) Concentrated its attention and resources on
specific programs such as the electronic
data processing markets and the semiconcuctor portion of that market (VLSI Pro.
gram); and
6) Has consistently and vigorously promoted the
domestic and international commercial
interests of Japan.

COMPUTERS and PEOPLE for March, 1978

7

To illustrate these actions of the Japanese
government I will use four specific examples. One
example would be the situation that surrounded the
inquiries by the International Trade Commission (ITC)
when examining the American television market. The
ITC received a response from the Ministry of International Trade and Industry (MITI) in Japan, which
contained as part of their response to ITC questioning the following two paragraphs:
Thus, MITI directed Japanese television manuincluding the present Japanese defendants, to enter into an agreement under article
5.3 of the export and import trading law with
respect to minimum prices and other matters concerning domestic transactions relating to e~ports
to the United States, and further directed the
exporters to establish a new regulation to be
observed by the members of the Export Association
with respect to filing of export prices and other
related matters pursuant to the association's
functions under Article 11, Subparagraph 2 of the
same law regarding the same exports.
facturer~,

Had the Japanese television manufacturers and
exporters failed to comply with MITI's direction
to establish such an agreement or regulation,
MITI would have invoked its powers provided for
in the export trade control order under the Foreign Exchange and Foreign Trade Control law in
order to unilaterally control television sales
for export to the United States and carry out
its established trade policies.
The control of the Japanese export situation evidenced
in that response is much more dramatic than seen in
this country. Implications of the response include
price setting and market share determination for products sold in the United States.
Testimony of Zenith Corp.

Clearly, U.S. laws, and not MITI, should control
agreements of this type. The situation surrounding
this MITI involvement in trade relative to television
sets from the mid-60s on through 1977 is contained
in the testimony of Mr. John J. Nevin, President of
Zenith Corporation, before the International Trade
Commission. During those presentations, Mr. Nevin
made it clear that if that same agreement had been
signed by American manufacturers, there would have
been criminal anti-trust prosecution against them.
A second example would be the telecommunications
market within the United States and Jap~n. The
telecommunications market is an excellent example
of a case where Japan has arranged to protect its
internal market from penetration by U.S. firms.
Japanese telecommunications manufacturers have been
very active in the U.S. market for many years. Central office equipment for control of telephone systems utilizing Japanese equipment have been installed
by a number of the American telephone companies, including Southern New England Telephone, South Western
Bell, Michigan/Ohio Bell, and Central Telephone Company. In addition, the Japanese have installed
numerous PBX systems throughout the U.S. that utilize
Japanese manufactured equipment.
Japanese Protection

Telephone Administration (NTT). The Japanese have
effectively shielded their internal market from
access by American suppliers. This is a very key
point to semiconductor suppliers since the telephone
industry represents a major opportunity for the
application of advanced semiconductor technology.
Telecommunications requirements are, in fact, much
more at the cutting edge of our industry than are
the requirements for most defense projects.
A third example of Japanese protection of their
internal industry would include their handling of
patent matters. In Japan, an opposition procedure
exists within the patent office. Under this procedure, applicatioQs believed allowable by a patent
examiner are published, opposition and third parties
may then oppose the grant of a patent. It is common
practice for Japanese companies to oppose patent
applications filed by U.S. companies.
In the United States, however, the patent laws
are much more liberal. As a matter of fact, the
U.S. recently further liberalized their law by
entering into a new patent cooperation treaty with
Britain, West Germany, Switzerland and several
countries in Africa. The treaty provides for a
single international patent application to be filed:
ideas filed under this procedure would be protected
in the dozen or so countries that are participants
in the treaty. Japan is notable by its absence in
this type of agreement. This illustrates the openness of patent protection in the United States and
the much more difficult relative situation within
Japan.
Lifetime Employment

Lastly, the Japanese are very proud of their
practice of lifetime employment for all personnel
who are hired by Japanese companies. Indeed, this
is a very admirable trait of their business posture.
In a recent appearance before the National Press
Club of Japan, however, the Vice Minister for International Finance, in a lengthy statement regarding
the trade policies of Japan and his reasons for substantial control of the exchange rate of the yen,
explained that "With this much black ink, the exchange rate goes up and, from a foreigner's viewpoint, this should cause the emergence of some industries that can't make ends meet by exporting,
leading to such companies withdrawing from exports
and gradually creating a balance in a nation's
international payments. That is what the textbooks
teach."
"But with Japanese practices of lifetime employment, it's not that easy to fire workers and shut
down plants. Here, flexibility is limited." /2/
"Japan, Incorporated"

He goes on to explain that in the Japanese situation, production continues and export markets are
sought for the product. The natural extension to
these comments is that products are in fact dumped
on foreign markets to absorb the effects of this
lifetime employment policy. This situation is
clearly intolerable to trade partners of Japan because it implies that a Japanese worker has a larger
right to employmetit than a worker in a competing
American plant.

In Japan, however, only Japanese-made components
can be used in the equipment used by the Japanese

8

COMPUTERS and PEOPLE for March, 1978

Thus, considerable evidence exists that the
Japanese economy is very much in the control of the
Japanese government. Actually, the term "Japan,
Incorporated" is a very appropriate way of viewing
that economy.
Outlook for Computer and Semiconductor Industries

Moving now from the discussion of the basic problem, I would like to discuss the outlook for the
electronics industry in general and the computer and
semiconductor industries in particluar, relative to
the Japanese.
It is important for all of us to recognize (as
two members of the Japanese computer industry recently pointed out in the "IEEE Spectrum") that "the
Japanese government considers computers strategic
national products, and so has guided manufacturers
into avenues of research and development designed
to meet the needs of the Japanese economy in both
the domestic and export markets." /3/ In the same
issue of "IEEE Spectrum" persons involved with the
semiconductor industry pointed out that "a key element in the growth of Japanese semiconductor technology is the close cooperation among industry, the
academic world, and the government." /4/ It is
common enough to discuss the role of MITI in the
establishment of the VLSI program in Japan, but it
must not be forgotten that nu~erous sources of
government aid exist there. These are: (1) MITI;
(2) NTT, the previously mentioned telephone administration which is heavily responsible for the current
position of Japanese manufacturers in memory components; (3) the Ministry of Education, Research
and Culture; and (4) the Japanese Technologies Agency. Specifically, the VLSI program is a concerted
effort to establish the Japanese electronic data
processing industry at the forefront of computer
capability in the 1980s.
Objective: Worldwide Computer Dominance

From available reports, it is'clear that the objective is worldwide EDP dominance. Support in the
hundreds of millions of dollars, with most recent
figures at $350-400 million for the semiconductor
portion of the program, has been committed to a combine of the largest computer and semiconductor companies in Japan. NTT, with its internally protected
market, is part of the combine.
It is important for us to recognize that this
program is only now being launched; it has not yet
succeeded. American technology is fully capable
of reaching or surpassing the objectives laid down
for VLSI, but we fund research and development with
internally-generated profits. Our profi ts need to
be achieved from open competition in a free and
equitable international marketplace. If we support
a continuation of trade imbalance, government subsidy, and acknowledged "dumping" as national policy
in Japan, then we will be hard pressed to continue
the level of investment required to insure that
semiconductor technology so critical to a wide ran~e
of American industries (EDP, telecommunications,
automotive control, not to mention defense) is available.
Free Trade, Not Quotas, Not Barriers

What then, are some of the solutions to the overall problem of balanced trade between our countries?

We seek this objective. We in the semiconductor
industry, and at National Semiconductor specifically,
are not interested in trade quotas; we are not interested in added trade barriers; we are advocates
of free trade. We believe that trade barriers of
all types, whether tariff or nontariff barriers,
should be eliminated. We believe that balanced trade
should occur between developed countries of the
world. And, we believe that international trade
should be based on equitable treatment for all competitors in a given market.
More Exports or Less Imports

There are really only two alternatives that have
any merit: the United States could increase its
exports into Japan, or, secondly, it could limit its
imports from Japan. In March of this'past year, the
solution proposed by Prime Minister Fukuda was that
Japan would in fact take an active role in increasing the level of its imports. However, subsequent
to that time, MITI has stated that the Japanese
economy is not currently strong enough to absorb
more imports. Thus, the commitment which was made
by the Prime Minister has not been carried out.
Figure 1 certainly shows that the Japanese purchase.s of American goods has stagnated. A major trading company official argues that "Japanese people
are uncertain about the future; they are willing to
deposit their money, but not to spend it." /5/
Another trading company official argues that "the
best way to narrow Japan's favorable trade balance
with the United States is to have Japan step up its
direct investment here [in the U.S.J." /6/ This
would not necessarily be in the best interests of
the U.S. economy. Testimony before the ITC showed
that in the Matsushita acquisition of Motorola's
television assets in 1974, in spite of its pledge to
protect the jobs of the Motorola employees, 4,300 of
the 6,700 people employed by Motorola had been laid
off by the end of 1976.
Only Available Solution: Cut Back on Imports

Thus, it appears that the only available solution
is to cut back on the level of imports from Japanese
sources. U.S. industry must be the prime mover in
any such action in that ultimately they are the purchasers of a large amount of the imported product.
The accomplishment of a reduction in import purchases
can only come through intelligent self-restraint on
the part of executives throughout industry as they
weigh the arguments related to the inequities which
result from a distorted balance of trade over an
extended period of time. I would propose that "zero
based purchasing" be applied to requirements where
the vendor is Japanese. We are not proposing to
reduce our imports to zero; we are proposing that
they must be cut to half the level that they are at
today in order to provide for balanced trade in the
absence of increased U.S. exports to Japan.
Swift Action

Furthermore, the U.S. government, I believe, must
act swiftly in resolving this trade imbalance issue.
I think a number of steps are open to the government.
First, I believe that the establishment of a cabinetlevel trade position (called, perhaps, the Secretary
of Trade) is vital to the future interests of the
United States. The Japanese have been very successful in coordinating their trade policy through the
(Please turn to page 17)

COMPUTERS and PEOPLE for March, 1978

9

Technology Transfer

•

In

Transition

W.S. Anderson, Chairman
NCR Corporation
1700 S. Patterson Blvd.
Dayton, OH 45479

"Many Third World countries tend to look upon technology transfer as simply a new, more subtle
form of colonia/ism. "

Technology Transfer

Technology transfer is truly in a time of transition. It is a transition which has far-reaching
repercussions, not only in terms of national security
but for American business and especially for the
industries represented at this conference.
I bring to these discussions no quick and easy
answers to the difficult political and economic
questions which technology transfer poses. Indeed,
in this subject, we face problems of almost infinite
complexity. But they are problems we cannot afford
to ignore.
From West to East: From Developed to Developing

As you know, there are two major areas of technology transfer that are foremost in the news today.
These are technology transfer from the West to the
East, to use the geographic distinction, and technology transfer from developed nations to developing
nations.
I should like to concentrate on those two areas
rather than the third category of West to West technology transfer, because I believe they present the
most immediate and most critical challenges -- both
to government and to business. Let's look first at
a few of the economic reasons that have made technology transfer such an important issue.

u.s.

Trade Deficit

international trade grew more than 10 percent. Last
year's growth will be only about half that rate, and
a further reduction is anticipated for 1978.

u.s.

Exports

Not too many years ago, exports accounted for only
about 5 percent of this country's Gross National
Product. Foreign trade was not all that important
to the United States. Today, however, exports represent almost 10 percent of all this country's goods
and services, and they provide jobs for some 8 million Americans.
Despite that growth in exports, this country's
competitive position in the international marketplace
has seriously eroded. In 1958, for example, the
United States' share of the world's manufactured exports was 28 percent. Today that share has shrunk
to 20 percent. In fact, according to a recent study
by the General Agreement on Tariffs and Trade, manufacturing output in the Western nations as a whole
has been virtually flat since 1973. In contrast,
manufacturing output in developing countries has been
growing at 6 percent a year during the same period.

u.s.

Decline in Research and Development

Meanwhile, the percentage of U.S. Gross National
Product devoted to research and development has
steadily declined to the point where, in many industries, the technology of other Western nations equals,
or exceeds, our own technology.

The United States will report this year a staggering trade deficit of almost $30 billion, and the
outlook for next year is even bleaker. Meanwhile,
unemployment in the U.S. remains stubbornly high at
almost 7 percent. In view of these developments, I
think we all would agree that America needs to expand its foreign trade rather than restrict it. And
in tOday's technological world, expansion of foreign
trade inevitably means an increase in technology
transfer.

These are disturbing developments. They suggest
that we face not only the problem of achieving more
intelligent control of the transfer of our technology,
but also the problem of stimulating the further
growth of that technology.

Yet, the fact that the world trading system is in
trouble cannot be disputed. Last year the volume of

The Department of Defense has pointed out the
promotion of international trade and the protection
of national security are not always reconcilable objectives, and that the United States must safeguard

Based on a talk before the Conference on Technology Transfer in Transition, Washington, D.C., Dec. 1977.

10

I have touched on a few of the economic incentives
to develop a comprehensive national policy that fosters the export of products and technology. But what
about the risks of such a policy?

COMPUTERS and PEOPLE for March, 1978

its current technological edge in certain key areas
which have potential military applications.
"The Rope Which Will Hang Capitalism"

I strongly endorse this position, and I'm sure
all of you endorse it as well. We live in a divided
and dangerous world -- a world in which technology
has become the cornerstone of national security.
And contrary to Lenin's prediction, we do not advocate supplying the rope with which capitalism will
eventually be hanged.
Our dilemm q , therefore, is not disagreement with
the principle of controlling the transfer of critical
technology, but rather a lack of consensus as to
what should be controlled, and the absence of a consistent ~ational policy on how that control can best
be achieved.
What is technology transfer? Is it primarily a
transfer of the ability to develop and manufacture
an industrial or military product? Or is technology
transferred, in effect, when that product is sold
to another country?
Guidance for the Department of Defense,
from the Bucy Report
A~cording to the Bucy Report, which was prepared
for the guidance of the Department of Defense, products are simply the end result of technology. What
really counts is the transfer of the know-how to
design and manufacture those products. Based on
that conclusion, the Bucy Report urged that control
of technology transfer should therefore focus on
proprietary technologies rather than the export of
end products. Specifically cited were such areas
as co-development and co-manufacturing agreements,
the sale or licensing of manufacturing or technical
data, the training of personnel, and the sale of
turnkey manufacturing plants.

In fact, the Bucy Report points out that the
sale of U.S. products, in contrast with the sale of
technology per se, tends to produce long-term national benefits. The reason is that product sales generate profits, which in turn provide funds for increased research and development, thus helping to
preserve technological leadership.
Unfortunately, the question of technology transfer
from the West to the East is complicated by the fact
that no single nation has a monopoly on research
and development capabilities. If the United States
doesn't supply a given technology, some other country probably will.
Western Europe and Japanese Technology

We have all seen evidence of this, as Western
Europe and Japan have made strong and successful
invasions into world markets previously dominated
by the United States. And these aggressive international competitors have proved not only that they
can match U.S. technology, but that they can successfully market the products of that technology as well.
Since we cannot expect to bottle up a given technology for any extended period of time, should we
therefore exploit that technology to the limit even
though it may come back to haunt us? It is a difficult question and obviously one for which there is
no universal answer.

The Regulatory Maze

Currently the United States has the most stringent controls over the export of high-technology
products of any Western country. Yet, lack of standard criteria and a jungle of conflicting interpretations make it extremely difficult for U.S.
industry to assume a responsible position in the
transfer of technology to Eastern countries.
The regulatory maze is at times ludicrous. It
is not surprising, for example, that the Office of
Munitions Control requires a special permit for the
export of cryptographic devices. What is surprising
is that the regulations for such exports do not
differentiate nonmilitary cryptographic devices from
those that have military implications. As a result,
our industry cannot export automated bank teller
machines containing data encryptors without first
obtaining a munitions license. The fact that the
National Security Agency has determined that this
type of product is totally "benign," to use their
own term, makes no difference. The drawn-out licensing procedure must nevertheless be followed.
I cite this example not as a criticism but as an
indication that it is time to clearly define the
rules governing West-East technology transfer, to
apply those rules consistently, and to modify them
when and if circumstances change.
100 Critical Technologies

There are encouraging signs that the government
is beginning to move in that direction. Currently
under review by the Department of Defense are more
than 100 so-called critical technologies, to determine which of those technologies should be more
closely controlled. Meanwhile, the Department of
Commerce's Office of U.S. Export Control is studying, on a country-by-country basis, both the risks
and benefits of technology transfer. The Department
of State is currently preparing for the next round
of negotiation of the Coordinating Committee on EastWest Trade (CoCom), which, as you know, was established to control technology transfers by NATO countries and also Japan to potential adversaries. And
in Congress, the House Subcommittee on International
Policy and Trade is holding hearings on the present
export licensing process.
Based On these and other inputs, the National
Security Council is preparing recommendations for
the President which hopefully will clarify this country's posture on many aspects of technology transfer.
Order out of Disorder

These efforts by both the executive and legislative branches to bring some semblance of order out
of the present disorder merit the support and cooperation of private industry. But at the same time,
many of us are apprehensive. We have a nagging fear
that what will finally emerge from these somewhat
overlapping efforts will be over-regulation of technology transfer. If that happens, there is always
the possibility that in curing the disease, the
doctor will have killed the patient.
If, for example, the Departme~t of Defense interim
policy of requiring the licensing of critical technology transfer to any country prevails, the United
States' competitive position in key world markets
will be seriously jeopardized.

COMPUTERS and PEOPLE for March, 1978

11

Questions Without Existing Answers

In addition, such a course would raise other serious questions for which, to my knowledge, no answers
presently exist. As only one example, suppose an
overseas subsidiary of a U.S. company develops a socalled critic~l technology which it proposes to export. In such as case, would that technology be
subject to U.S. licensing requirements?
One must also question whether the subsidiaries
of U.S. multinationals can, over the long run, remain viable competitors with local companies if their
U.S. parent is not allowed to transfer its technology
to its subsidiary operations.
Certainly everyone concerned with the technology
transfer process -- and that includes government as
well as business -- needs a clearer idea of whether
critical technologies developed for commercial products have contributed, or could contribute, to the
military potential of a possible adversary. To date
we have seen little evidence that they have. In
fact, one could argue that no country can afford to
build its military capability around dependence on
foreign technology. If there is evidence to the
contrary; I am sure that industry would be zealous
in policing its own transfer processes.

becomes minimal, the nation will pay a high price
for that regulation. Many industries will substantially reduce both their overseas investments and
their investment in research and development, with
a resultant adverse impact on future technological
development. And in the long run, that could be
counterproductive to national security.
Finally, I wonder if our concept of national
security is broad enough. Should it not extend well
beyond military capability and the control of critical technology transfer? What about our national
policy as it pertains to investment and thus to the
long-term strength of our economy? I have already
mentioned the declining percentage of GNP currently
going into research and development efforts. Concurrently, this country's industrial plant continues
to age. The result is that we are lagging behind
our international competitors,in several key industries, in terms of efficiency and annual productivity
improvement.
The United States clearly needs to encourage
greater investment in research and development and
the replacement of obsolescent plant and equipment.
It needs to stimulate the investment of more venture
capital -- the kinds of investment which in the
1960s led to the development of much of the exotic
technology used in today's military systems.

Export of Obsolete Technologies?

The Department of Defense has stated that insofar
as West-East transfer is concerned, the fact that a
given technology is obsolete by U.S. standards is
beside the pOint. What matters is whether it would
significantly advance the receiving country's military potential. But is the issue really that simple,
in view of the pace of today's technological advances?
Obviously, the determination of·what constitutes
critical technology is a crucial and still only partially answered question. The current listing, for
example, includes technologies pertaining to memory,
distributed data base systems, large-scale integrated
circuits and plasma displays. In view of the widespread capabilities in these areas of teChnology, it
is doubtful that their export by American companies
would provide a competitive edge to potential adversary countries.
The Department of Defense aCknowledges that it is
dealing with a moving target, and says it will continuously update the list of critical technologies
and/or end products whose export will require licensing in order to protect national security. This is
a commendable goal but one that is more easily stated
than achieved, especially in the absence of hard
evidence that a given technology is or is not being
utilized for military purposes. And of course that
kind of hard evidence is difficult to obtain due to
the fact that most military developments are shrouded
in secrecy.
What Helps and What Hinders National Security?

As new guidelines for West-East technology transfer are developed, One hopes the developers will remember that this country's current technological edge
in many industries is due in large measure to the
fact that ours is still a relatively free and open
economy. If additional controls restrict international sales to the point where return on investment

12

I have touched on only a few aspects of the problem of technology transfer from West to East. But
I think it is apparent that the issues raised by that
problem cannot be resolved by simplistic slogans, or
by the unilateral actions of government alone. Additional government-industry interchange is mandatory
if the best interests of the United States and its
people are to be served.
Technology Transfer from
Developed to Developing Nations

All nations agree on at least one point: Capital
and technology are the primary ingredients for economic growth and improved living standards. But,
unfortunately, both capital and technology are in
short supply in most of the world's developing countries. The capital needs of these countries are
universally recognized. Progress in meeting those
needs has been slow, but progress is being achieved.
Can we say the same about their acquisition of needed
technology?
I doubt it. Even as developing countries strive
to acquire more technology, the technically advanced
countries grow increasingly apprehensive of sharing
their industrial and scientific knowledge.
The Know-How "Monopoly" of Western Nations

The reasons for this approaching impasse are not
obscure. Many developing countries, for example,
believe that the current process of technology transfer tends to perpetuate the know-how "monopoly" of
Western industrial nations.
Poorer nations also fear they are paying too high
a price to acquire technology, thereby worsening
their already critical balance-of-payments problems.
And finally. they feel they are at the mercy of developed countries because their lack of technical expertise precludes negotiating fair and equitable agreements involving technology transfer.

COMPUTERS and PEOPLE for March, 1978

Thus, many Third World countries tend to look
upon technology transfer as simply a new, more subtle
form of colonialism.

how to create a massive highway system is of Ii ttle
use in a country with virtually no motor vehicles.
Interdependence

In a growing number of cases this is prompting
legislation which seeks to regulate technology transfer by brute force. Restrictions on licensing payments, the duration of agreements, and the supplier's
proprietary rights are typical of such legislation.
Frequently, governments cancel at will agreements
previously entered into in good faith by both parties. And at the international level, various "codes
of conduct" are being advanced as cure-aIls for the
developing countries' technological gap.
That's one side of the picture. But consider the
almost diametrically opposed viewpoints of technology
suppliers:
For the most part, these are privately owned companies which, rather than enjoying a monopoly, operate in fiercely competitive markets. They understandably worry about the boomerang effect of sharing
expertise they have acquired at heavy expense. This
same concern is shared by their governments, which
feel that accelerated technology transfer will seriously impact employment levels and tax revenues.
In addition, technology suppliers and their governments question whether hard-pressed developing
countries understand that reward for innovation is
the mainspring of any free-market economy, and that
any weakening of such rewards saps the economic
vitality of both the supplier company and country.
The controversial facets of technology transfer
are further complicated by widespread misunderstandings.
Many developing countries view technology transfer
as a business in itself. But is it? Multinational
corporations that develop and manufacture products
abroad, thereby transferring technology, do so to
compete in markets they cannot effectively cover
through exports. Technology transfer is thus subordinate and largely incidental to their basic business
objectives.
Also, business management does not own the technology for which developing nations are clamorLng.
It belongs to shareholders, who feel no compulsion
to scatter that technology around the world and who
expect a reasonable return on the investment they
have made on its development.
How Does New Technology Take Root?

An additional question posed by technology suppliers is whether the expertise being sought by many
developing countries can actually take root and produce the economic fruits that are envisioned. Does
a country in an early stage of industrial development have the trained people, and the necessary technical infrastructure, to produce the most powerful
computers, the fastest aircraft, the most efficient
atomic power plants! and the newest miracle drugs?
Assuming such latent capability exists. does it
make economic sense for them to do so? Where will
the markets to provide the essential economies of
scale come from?
And can the sought-after technology actually make
a meaningful contribution? The machinery and know-

Unfortunately, in many developing countries there
is only a fuzzy definition of national objectives
and widely differing opinions regarding the types
of technology most urgently required. A major objective of almost every country, for example, is
economic self-sufficiency. But what country is
self-sufficient? Even the United States, which is
generally regarded as the world's richest and most
technologically advanced country, is heavily dependent on other nations.
Perhaps the most difficult aspect of the problem
is that many fields of technology today are changing
at a fantastic pace. A generation ago the blueprints, tools, and know-how for the production of
a small business machine could be readily transferred to almost any country. That technology was
then usable for 10 to 15 years. This is no longer
true. Today, the technology of the business equipment industry is moving so rapidly that by the time
a small computer system could.be put into production
in some countries it would already be Obsolete.
New Levels of Understanding

Can the gap between the world's potential technology suppliers ever be narrowed, I believe it
must be, not only for obvious humanitarian reasons
but because the economic and political future of
much of the world hangs in the balance. If this is
to be accomplished, new levels of understanding will
be required on the part of both suppliers and potential users. As a first step, developed countries
must face up to the need for developing nations to
improve their living standards, through more productive employment and other benefits of industrialization.
Developed countries, which have so successfully
marketed their products and services worldwide, also
face a new kind of selling challenge. It is to ~on­
vince the developing countries that there are valid
reasons for a supplier to maintain reasonable control
over the transfer of his technology and for receiving
fair compensation for its use. In addition, countries and companies with exportable know-how must
recognize that it cannot long be hoarded. A technological advance provides the innovator with only
a temporary competitive edge. Thus, if a developing country cannot get the technology it wants from
one source, it can eventually get it from another.
The "Forcing" of Technology Transfer

It is a paradox that most technologically advanced
countries, including the United States, lack overall
national policies on technology transfer to developing countries. Yet no reasonable government or company questions the necessity for developing nations
to achieve economic progress, or the vital role of
technology in that evolutionary process.
And what about the developing countries? Too
often they assume that their intense desire and obvious need for technology justify "forcing" its
transfer. But in almost every case such measures
are self-defeating. Mounting local government intervention in the transfer process only makes delivery

COMPUTERS and PEOPLE for March, 1978

(please turn to page 18)
13

The Police Information Network
of New York State
R. Natnanson
Racal-Milgo, Inc.
8600 N. W. 41st St.
Miami, FL 33166

"The significance of this inquiry system is that response time,
the length of time it takes the computer to process the user's
inquiry, is less than 5 seconds ... and usually only 1 or 2 seconds. "

Chronology

The need for rapid teletype communications and
retrieval of stored information became a necessity
for the New York State Police in 1964. At that
time, a study of the manually operated message
switching system indicated that operational delays
and mechanical inadequacies existed which could only
be remedied through the use of a computer-oriented
system. A request for such a computer system was
made to the New York State Division of the Budget.
After approval was granted, specifications for a
computer system were published in June, 1965.
In September of 1965 an award was made to the
UNIVAC Corporation and early the next year a UNIVAC
418-11 Computer System was installed. The use of
this system was a breakthrough in New York State's
data processing history, because it was the first
successful operational real-time system installed
in a New York State agency.
In February, 1968 an extensive survey was begun
by the Division of State Police in cooperation with
the Division of the Budget concerning the the functioning of the computer system. As a result of the
Budget Management Unit study, it became evident that
the success of the New York State Police Computerized Communications System had resulted in overloading it beyond its effective capabilities and required functions.
In the best interest of the State and of Law Enforcement in the State, specifications were released,
with Division of Budget approval, for a flexible
third generation computer in January, 1970. Computer manufacturers were asked to present proposals
for a system scheduled for installation by April.
1971. In May, 1970. the RCA Corporation was selected as the successful vendor and early the following year an RCA Spectra 70/60 third generation
computer system was installed in the New York State
Police Headquarters in Albany.
System Description

The New York Statewide Police Information Network (NYSPIN) provides the State of New York with
Based on a report, "New York Statewide Police Information Network,"
prepared by the New York State Pol ice, 1977.

14

a functional statewide law enforcement communications
network comprised of many sub-systems. This permits
the New York State Police to fulfill its obligations
under Section 217 of the Executive Law.
NYSPIN serves over 396 on-line terminals (with an
estimated addition of 200 more terminals by Fall of
1978) in addition to four existing county systems
having 187 terminals.
These include:
1)
2)
3)
4)
5)
6)

State and Municipal agencies throughout
the State.
Criminal Justice agencies
Federal Bureau of Investigation (FBI)
National Auto Theft Bureau (NATB)
Federal Bureau of Narcotics
Federal Bureau of Customs

In addition to the terminals mentioned above.
NYSPIN is computer-to-computer interfaced with the:
1)
2)
3)
4)
5)
6)

National Crime Information Center (NCIC)
in Washington, D.C.
National Law Enforcement Telecommunications
System (NLETS) in Phoenix, Arizona
Department of Motor Vehicles (DMV) in Albany, N.Y.
Division of Criminal Justice Services
(DCJS) in Albany. N.Y.
New York City Police Department
Erie County Central Police Services

The NYSPIN Computer Center is equipped with the
following series 70/6 hardware:
2
2
5
2
1
1
1
1
1
1
1
2
1

X
X
X
X
X
X
X
X
X
X
X
X
X

COMPUTERS and PEOPLE for March, 1978

70/6 CPU
4 Selector Channels
262k Memory (Switchable)
8097-020 Console
70/234 Card Punch
70/237 Card Reader
70/242-30 Printer
70/243-31 Printer
70/310-23S/l Switch
70/310-27S/1 Switch
70/432-2 Dual 30KB Tape
8442-002 Dual 60KB Tape
70/473-208 Tape Controller

8
4
5
66
22

X
X
X
X
X

DASS 8440 (800 Mega Bytes)
5521 M/C Switch
70/668 CCM
70/720-21 Buffers
70/721 Buffers

header. The header is minimal in size and consists
of set character fields which distinguish addresses
and functions to be performed. The Message-Switching program examines the message header, validates
it, and determines the correct routing for the message.

NYSPI N Sub-Systems
Inquiry System: 2 Seconds

NYSPIN combines capability, versatility and flexibility, virtues which are not usually found in a
message-switching system of this complexity and size.
For example, it gives users guaranteed message delivery. Upon acceptance of a correctly coded message, the system shoulders complete responsibility
for the proper transmission of the message. Every
message is assigned a number that will allow retransmission in cases of garbled output or suspected
message loss.

The Inquiry System controls terminal inquiries
made by the NYSPIN user into the computer data
base. The significance of this system is that response time, the length of time it takes the computer to process the users inquiry, is less than
five seconds. In fact, users inquiries generally
are processed in 1 to 2 seconds!

From a functional viewpoint, the NYSPIN system
may be considered as consisting of two sub-systems;
the Message-Switching and the Inquiry systems. This
distinction is made because the Inquiry System normally handles only certain designated types of messages and has response times different from the
Message-Switching System.

For example, a police agency may inquire into
the computer concerning a suspected stolen vehicle.
Once received, the computer checks the vehicle in
question through its stolen car file or its license
plate file. These files presently contain over
200,000 wanted vehicles and lost or stolen registration plates. In less than five seconds the
computer checks this entire file and sends a reply
to the original inquirer.

The sub-systems provide NYSPIN users with the
capebility of directing intrastate messages, utilizing its data base, initiating broadcast messages
and communicating with other linked computer systems.
A station can send direct, point-to-point messages
to any other terminal in the system and can also
access the NYSPIN, NCIC, DCJS nad DMV systems. A
user may inquire of the system for a record and
within seconds receive a response. In addition,
updating the data base files is performed directly
from the terminal.

The backbone of the Inquiry System is the NYSPIN
Data Base. This is the computer's files. In addition to querying these files, users, through interfacing with other computer systems, are able to
access the files of other state and national agencies. Additionally, the inquiries are assigned
priorities according to the type of inquiry. This
insures that more serious inquiries are processed
first. For example, an inquiry concerning a wanted
person would be processed before an inquiry concerning suspected stolen securities.

The NYSPIN System

Data Base File Sets

From the central computer in Albany, messages
are received, switched, and files accessed and updated. Messages destined for out-of-state are
switched to the NLETS computer center in Arizona.
Inqui ries are made to the files of DCJS, DMV and
NCIC as well as NYSPIN. In addition to a complete
system monitor at the central computer center, control points throughout the state monitor a given
area to combat communications problems.

The following types of information are stored as
file sets within the NYSPIN data base. A user may
access any of these file sets through the Inquiry
System:
1.

2.

Message Switching System

The computerized Message-Switching System provides for continuous monitoring of the terminals
in the system. This provides a means for determining if a terminal may send or receive a message.
3.

The system is used by any of the over 280 subscribing agencies to transmit and receive normal
point-to-point messages. Terminal users have the
additional capability of transmitting to a large
number of terminals simultaneously through the use
of group codes. When a message is transmitted by
a terminal, this system receives the message,
examines it, and stores it until the proper function
associated with the message can be performed. This
entire process is accomplished in a matter of microsecond s.
When generating a message, terminal operators
follow certain format requirements. Specifically,
the text of a message is preceded by the NYSPIN

4.
5.

6.

Vehicle File:
a. Unrecovered stolen vehicles, vin-plates,
aircraft, snowmobiles and dune buggies.
b. Unrecovered stolen major automobile
components.
License File:
a. Unrecovered stolen or missing license
plates.
b. License plate numbers of vehicles wanted
in conjunction with felonies or licensed
through the use of fraudulent papers.
Gun File:
a. Lost or stolen serially-numbered weapons.
b. Weapons recovered for which no lost or
stolen report is on file.
Article File:
a. Indi vidual serially-numbered stolen
property items.
Securities File:
a. Stolen, embezzled, counterfeited or
missing serially-numbered identifiable
securities. Also included are warehouse receipts y travelers checks and
money orders.
Boat File:
a. Unrecovered stolen boats providing the
vessel is registered or documented and
there is a permanent identifying serial
number affixed.

COMPUTERS and PEOPLE for March, 1978

15

Interfacing Data B~se

The NYSPIN user not only has access to the NYSPIN
Data Base, but as previously noted, he also has access to other computer data bases through interfacing
with other computer systems.
Each computer system has distinct interplay requirements, buffer capacities, hardware interface
constraints, inquiry processing time frames and format considerations. For example, a police agency
checking a stolen firearm would automatically have
its teletype inquiry routed to the NCIC data base
in Washington. This, in effect, makes the NYSPIN
system national in scope. The following systems
are interfaced with NYSPIN:
National Crime Information Center (NClC): This
is an inquiry/response system containing national
files on stolen firearms and property, stolen
vehicles,wanted persons, missing persons and crimina 1 hi story.
Department of Motor Vehicles (DMV): This inquiry/
response system consists of extensive files on
all vehicle registrations and driver licenses for
the state of New York.
Division of Criminal Justice Services (DCJS):
This is an inquiry/response system containing files
on criminal history.
National Law Enforcement Telecommunications System (NLETS): This is a message switching and inquiry/
response system allowing DMV checks and message dissemination on a national basis.
Mobile Digital Application

NYSPIN became the first state law enforcement
agency in the nation to provide a digital communications link between a mobile terminal and a base station data file. The mobile terminal in use, mounted
in the front seat of a troop car, consists of a typewriter-like keyboard with a visual display screen,
similar to a TV screen, and a printout unit.

data in a common effort to improve the effectiveness
of law enforcement in New York State. It has been
established that readily available information, used
as an extension of the law enforcement officer's
individual resources, is a highly effective aid in
combating mobile criminal elements. It is toward
this end that theNYSPIN System is dedicated.
Additionally, criminal justice agencies have the
capability through NYSPIN to retrieve the information necessary for their effective and efficient
operation.
From the New York "Daily News," Feb. 5, 1977:
COP COMPUTER NETWORK HELPS
PUNCH OUT BAD GUYS
by Ted Belknap

Albany -- The woman stopped the luxury car on
the shoulder of the Thruway in response to the siren.
She had been speeding. A state trooper, following
procedure, called in the number on the woman's driver's license and registration.
At the trooper's home barracks at Schuyler, a
fellow lawman typed the numbers into a computer tetminal. In seconds, the memory banks of the computer answer that the woman is wanted by a sheriff's
department in New Jersey for drug-implement possesion and armed robbery. In addition, the car she
was driving had been reported stolen.
One of 225,000 Transmissions

The trooper's inquiry was one of 225,000 transmissions handled daily by the New York Statewide
Police Information Network (NYSPIN), a large and
sophisticated computer system housed in Building
22 of the State Office Campus here.
The response of the computer system was a "hit,"
an answer led to an arrest. The system's hit ratio
is about 5%.
340 Terminals in State

These versatile, easy to use mobile terminals
with rapid, error free message transmission, provide
the patrolling officer the capabilities to send or
receive messages, and to access the files of NYSPIN,
DCJS, DMV, NLETS and NCIC. With the information of
these files at their fingertips, officers are able
to act rapidly and with greater safety. Transmissions can be made car to car or to any terminal on
the NYSPIN system. As each message is sent from the
mobile terminal, the unit's status is recorded. In
case of an emergency, a large red button on the keyboard can be depressed which will automatically
transmit an emergency request for assistance. With
this mobile terminal, a Trooper need not use his
radio to check on the status of a stolen vehicle or
suspected felon. He need only only type the vehicle
plate number or the persons name. The message enters
the appropriaterdata base and a "hit" would both
illuminate on the screen and be printed out. This
entire procedure is accomplished in less than ten
seconds.
In conclusion, the NYSPIN system has transcended
the physical boundaries of law enforcement jurisdictions and allows agencies to communicate and share

16

There are 340 terminals of the computer system
at state police barracks and local police stations
throughout the state. Some of the terminals have
been installed in troop cars. Local police pay a
rental fee for use of the terminals.
The terminals feed into NYSPIN equipment housed
under tight security on the ground floor of Building 22. About 50 state police employees work in
the climate-controlled rooms full of blinking machines and television screens.
Connected with other Storage Banks

NYSPIN not only files information gathered by the
police in this state, but is connected with the storage banks in Washington, D.C. and Arizona to obtain
national crime information. It also connects with
the computers of the Department of Motor Vehicles
crosstown in Albany, and with departments in all
other states and Puerto Rico.
Apart from motor vehicle and driver records, NYSPIN
can file and retrieve information on wanted and miss-

COMPUTERS and PEOPLE for March, 1978

Kvamme - Con'tinued from page 9

ing persons, fraudulent documents, pistol permits
and registration numbers of boats and appliances.
Director Denies Danger from "Big Brother"

Is NYSPIN really Big Brother?
No, says Fred Frank, director of data processing.
"The system doesn't dea 1 wi th arrest records, and
once a case is cleared, such as a stolen car, the
information is expunged," Frank said. "I see no area
in which someone's civil rights could be infringed."
Two information factors are needed to identify a
person, but those two factors can be any combination of the information on a driver's license. If
only a name is fed to the system, the system will
respond with every identical name it has on record
with accompanying information, grouped, for example,
by age or color of hair or geographic zone. A name
might be the only one filed, or, in the case of John
D. Smith, there will be enough to fill up the screen
with addresses for quite some time o
Incomplete License Numbers

Incomplete license-plate numbers are sometimes
reported during hit-and-run cases. They can be submitted to the system and groupings will be fed back.
If all but the last digit of the plate number are
known, the grouping, for example, could include all
red cars with those digits.
Here are some recent NYSPIN "hits":
Two troopers from the Leeds barracks in Greene
County checked a disabled car occupied by six people.
A computer check showed that two of the persons were
wanted for armed robbery in Florida.
Rangers at Norrie State Park arrested a man armed
with a loaded shotgun. He was taken to the state
police barracks at Rhinebeck, where an inquiry was
made. NYSPIN replied that the man was wanted in New
Jersey for rape, two accounts of armed robbery and
larceny.

MITI organization. I am not proposing that a cabinet-level position would be as successful in this
country or in fact have the same powers as MITI does.
But it would at least place in a single government
agency the responsibilities that are now spread
throughout three or four cabinet positions. The Secretary of Trade would be held responsible for ensuring
that the United States proceed vigorously in the
direction of balanced trade with each of its trading
partners, particulary balanced trade with developed
nations.
Anti-Trust Provisions

Secondarily, I believe that reviews of the antitrust provisions of U.S. law, the investment-tax
incentives for critical industries, and the entire
question of support of basic technology would require
modification by legislative action. We have not
encouraged historically government involvement in
the semiconductor industry. I am not proposing that
government involvement is the only solution to our
problem. However, unless we have government involvement or support which is at least partially competitive with the support that Japanese companies receive
from their government, we will have a very great deal
of difficulty maintaining the position that we have
established in the past two decades in the semiconductor industry and beyond that in the computer and
data processing industries. It is estimated that
the balance of trade for technology items from the
U.S. is favorable at this point in time. That very
favorable balance of trade will be eroded much as the
balance of trade for consumer goods was eroded, unless we carefully and forcefully impress upon our
own industry and government the inequity of the
competitive stance being faced by the computer and
semiconductor industries, and thus the semiconductor
equipment manufacturing industry of the United
States.
The job faced by government in negotiating this
matter will not be easy. We should not continue
expecting that our position in negotiating a balanced
situation will be easy.
Different Rules for Different Teams

A state police patrol out of Chazy in the Adirondacks stopped a driver at 3 a.m. for various traffic
violations. According to a computer check, the man
was wanted in New York City for murder.
Speed is a Protection

Police report the system not only helps them in
making arrest, but protects them with its speed. By
calling in a plate number, a police officer can obtain information in seconds about the car's owner
before leaving his prowl car. Criminals are more
nervous, and more dangerous, in a lengthy road
check.

To quote again the Japanese Vice Minister of
International Finance from his appearance before
the National Press Club, "Japan is not likely to
adjust its economy to fit the American/European
pattern." The context of these remarks indicates
that they expect to continue to be active in the
international trade arena but that they are not planning on changing their procedures.
We cannot survive in a world where the rules are
different, favorable for Japan and unfavorable for
the U.S., fpr the opposing teams in the same game.
References

A secondary benefit is that the innocent motorist
is not unduly tied up.
The top users of the system are the state police
and the New York City Police Department, although
other agencies are slowly catching up.
D

/1/ "Washington Post," November 18, 1977.
/2/ Los Angeles "Times" report of the Tokyo National
Press Club Meeting, NOvember 5, 1977.
/3/ Ishii and Yamada, "IEEE Spectrum," September,
1977, p.40.
/4/ Sugano, Okoshi, Watanabe, "IEEE Spectrum," September, 1977, p.51.
/5/ Uemura, "Business Week," October 24, 1977, p.48.
/6/ Ikeda, "New York Times," November 11, 1977.
D

COMPUTERS and PEOPLE for March, 1978

17

Anderson -

Continued from page 13

of the technology more difficult and thus more expensi ve.- And local regulations that cause suppliers
to lose control over their own technology, or seek
to force its transfer at bargain-basement prices,
only serve to diminish or shut off entirely the flow
of know-how.
Technology transfer can be compared with a marriage. The partners in any marriage agree to live
together for better or worse. The marriage cannot
long survive if either partner rushes off to the
divorce court the first time there is disagreement.
Nor can the marriage thrive if one partner is
constantly and arbitrarily changing the rules. Yet
this is happening with increasing frequency in many
developing countries. The technology supplier is
simply informed that if a change in rules is not
followed, he will be expropriated or otherwide penalized.
Any Government Can Write the' Rules
It Chooses, and Change Them Anytime

Despite the vaunted power of multinational companies, such disputes are a conflict between unequals,
Any government, no matter how small the country, can
write any rules it chooses and the most influential
company is helpless to prevent the change. And under
those circumstances the "marriage" quickly becomes
a fiction.
It should therefore surprise no one that technology suppliers tend to look before they leap. Expertise is their most valuable asset. It they are
going to share that expertise, they understandably
seek out only those marriages in which there is
balance in the give-and-take relationship, and a
good chance for a lasting relationship.
Needed: Discussion and More Discussion

An essential step to narrow the current technological gap among nations is to establish more
direct, more continuous dialogue between the developed and the developing countries. Little will be
accomplished by white papers or codes of conduct
which reflect only the views of one government or
group of governments. Any business relationship -and technology transfer is essentially a business
relationship -- must be mutually beneficial and
mutually nurtured.
Unless such relationships are permitted to develop, those countries with the bulk of the world's
technology will have little or no incentive to transfer their technology, and thereby help to correct the
present imbalance among nations. And those countries
with too little technology will be thwarted from
gaining the economic development they seek and require.
The Most Important Issue: A More Satisfactory
Technological Balance

Former Secretary of State Kissinger said recently
that "No issue is more important to the future vision
of international order than the ways in which the
world will manage the output and distribution of
goods and services." To carry that thought an additional step: No issue is more important to managing
the world's output and distribution of goods and
services than achieving a more satisfactory tech-

nological balance among nations. It is an elusive
goal but one we need to strive for.
0

that The Northern Trust is in violation of the Bank
Holding Company Act due to an illegal tie-in requirement between cashier checks and payroll data processing. Northern has its customer payroll data processing done by Automatic Data Processing-Midwest, Inc.,
a subsidiary of Automatic Data Processing, Inc., of
Clifton, New Jersey.
STAT:TAB contends that the tie-in requirement has
caused it to lose clients and prohibits its ability
to gain new customers for its payroll services. Late
last year, The Northern Trusf entered into an agreement with ADP for ADP to take over the processing of
Northern's payroll customers and jointly market these
data processing services in the Chicago area. Northern, it is alleged, receives a percentage of the
revenue generated by this agreement. Further, the
suit claims that The Northern Trust has refused to
sell cashier's checks to customers for payroll purposes unless their payroll is processed by ADP.
In October of 1976, STAT:TAB filed an antitrust
action against ADP in the United States District
Court in Chicago. The suit for $25 million in damages and subject to trebling is still pending. In
that suit, ADP is charged whth attempting to obtain
a monopoly in Chicago and eight other metropolitan
areas, by various acts, including the purchasing of
payroll data processing business from banks, including The Northern Trust.
0

PUTTING COMMON SENSE INTO COMPUTERS -

Three 1977 articles by Lawrence Clark, Mathematician

"What is Common Sense?"

May, 1977, p.19

Computers can be taught to calculate, reason,
listen, and speak -- but can they be taught to
behave with common sense? To write a program
that uses much common sense, it is useful to
specify what common sense is.
"Designing a Computer Program so as to Have
Common Sense"
June 1977, P .17
A computer can be programmed to take into
account the entire range of common sense factors
and conditions in a context. Then feedback from
trials can bring the computer program closer and
closer to perfection.
"Designing a Computer Program to Have Common
Sense -- Part 2"
July 1977, p.18 .•.
An illustrative computer program improved by
common sense accomplishes a task common to small
businesses: monthly reporting on a group of sales
salesmen.
- - - (may be copied on any piece of paper) - - Berkeley Enterprises, Inc., 815 Washington St.,
Newtonville, Mass. 02160
Please send me the three 1977 articles on
"Common Sense" by L.M. Cl ark. I enclose
$6.00 which includes postage and handling

1
1

1

My name and address are attached.
-

18

Continued from page 26

Newsletter -

-

-

-

-

-

COMPUTERS and PEOPLE for March, 1978

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

-

__ I

Spelling and Reading English" Phonetically:
Gradual Change Accomplished by Computer,
and the

~~Soundspel"

System

Edward Rondthaler
Chairman of the Board
Photo-Lettering, Inc.
216 East 45 Street
New York, NY 10017
"Thanks to recent typographical and computer developments we can simplify our reading
matter first - in successive stages over a number of years."

A Society that Depends on Widespread Literacy

In America, those of us who can read and write
English have built a society that depends on widespread literacy. We offer broad educational opportunities to all -- to all, that is, who can read
and write. Those who cannot are left out. We've
provided no role for illiterates, and have done
nothing to make reading and writing simple.
What Is Basically Wrong?

What's basically wrong is this: English words
are made up of 43 different sounds, but we have
only 26 letters. If we had used certain letters
in regular pairs to represent the additional 17
sounds, reading and writing would be easy. But we
haphazardly spell our sounds in several hundred
different ways. A great deal of the spelling
scheme is very irregular. Remembering the different
spellings and struggling to learn which one goes with
which sound in which word makes spelling much more
difficult than it needs to be.
20 Million Functional Illiterates

In spite of this, most American adults can read
and write -- but 20 million cannot. Their frustrations show up in greater-than-average inclination
to throw sand into society's gears. They're not
the docile illiterates of yesterday. Unable to
master our prerequisite to education, deprived of
a significant role in society, many first become
dropouts, then juvenile delinquents and ultimately
full-fledged criminals. The alternative fate
awaiting them is often continued unemployment and
poverty.

are enough to make one wish that every sentence imposed could include a provision that would grant release when the prisoner had learned to read and
wri teo "
The Fetters of the Past

How can we escape from these stupid fetters from
a bygone age?
We can go straight to the root of the problem;
we can develop a painless way to make our spelling
reliably phonetic, as it is in other Western languages. With 20% of our schoolchildren -- the
rising generation -- facing life with serious reading and writing deficiencies, it's time for a frontal attack on what is, without doubt, a major barrier to edu~ation for all: erratic English spelling.
The Opportunity from the Computer

Simplifying our spelling has been a scholarly
pastime for centuries -- a sort of parlor game not
taken too seriously (except by a few men like George
Bernard Shaw and Bertie McCormick). The reason is
the absurdity of our traditional spelling is less
absurd than hoping that hundreds of millions who
read and write English will go back to school and
learn to spell allover again.
But, thanks to recent typographical and computer
developments, we can simplify our reading matter
first -- before we change our spelling habits.
Impossible? Consider this:

Furthermore many literate American adults cannot
find out the right spelling of words like "irresistable, irresistible," "instalment, installment,"
"harassing, harrassing" wi thout wasting time and
effort looking them up in a dictionary. Yet the
meaning and pronunciation are perfectly clear; and
in a better world than today's world both spellings
would be fully acceptable.

Typesetting methods are currently undergoing their
greatest change in 500 years. This revolution is
shaking the printing industry from top to bottom.
Typesetting is turning itself inside out as it changes from a three-dimensional mechanical process to
a two-dimensional photocomputerized process. Most
of the printing you read today is a product of this
revolution. No layman looking at the printed page
can notice a difference, but what goes on behind
the scenes is another matter.

Commenting on a report that more than half of
U.S. prison inmates lack functional literacy, Chief
Justice Warren E. Berger called the number staggering and added: "The figures on li teracy alone are

Today's new typesetter taps out the letters for
words on a computer-compatible keyboard linked by
magnetic or punched tape to a computerized phototypesetting machine. As the Gomputer receives the

COMPUTERS and PEOPLE for March, 1978

19

44,000 Most Used Words in
a Transliteration Table

words from this tape, it combines them with coded
signals that control the typesetting mechanism.
Automatic Change from Traditional
Spelling to Simplified Spelling ...

Now, if the computer had a little more capacity
it could easily be programmed to accept traditionally spelled words from the tape, simplify the spelling and combine the newly spelled words with the
typesetting signals. Thus a keyboard operator would
continue to spell traditionally, but the final product would be simplified -- automatically.
There's nothing novel about this concept except
its application: For years computers have unscrambled coded messages of far greater complexity. What
is new is that the typesetting revolution makes it
possible for computers to take over the hitherto impossible job of simplifying the spelling of English,
and to do so as a routine -- automatically, accurately, uncomplainingly.
So, without any adult being urged to change his
writing habits, without any reschooling of authors,
editors, copywriters, reporters or typesetters, we
have arrived at the point where printed English can
be simplified with just a direction to computer program.
... In Stages Over Many Years

We could, of course, make this change in one big
leap. But computerized typesetting lends itself
equally as well to a far more comfortable gradual
shift of perhaps 50 small steps. Step 1 would probably be to spell with an "e" all words that have the
clear "short-e" vowel sound: any, hed, frend, sed,
redy, heven, brekfast, and so on.
Throughout this article this first step is being
demonstrated -- and you can judge for yourself how
painless it is. If you are a literate person, you
would never need to change your own spelling unless
you wished to. Of course, you might choose to conform to some of the simplifications that show up in
print, but you would not have to. Computers will
do the hard work -- they will spearhead the change
You will follow along if and only if you want to.
Step 2?

Step 2 might use "f" to replace "ph," or "k" for
"ch" in words like kemistry and skool.
There would be 50 or more steps taken gradually
over as long a time as required. Unlike adopting
the metric system, spelling reform could be slowed
down or speeded up at any time over many years -and still leave us with a better spelling system
than ever befQre. This is actually what has happened
wi th past better spellings like "thru" and "ni te".
The Fiftyeth Step

If we jump ahead to the fiftyeth step, az printed
heer, it mae seem a bit aukward and perhaps a litl
dificult to reed, but it must be remembered that
this step wil not cum until yeerz after th furst step
haz bin tacken, and bi that tiem our reeding habits
wil hav had ampl oportuenity to ajust to a lojical
patern ov speling -- simplified sound-speling.

20

The means for carrying out experiments with this
26-letter system called "Soundspel" are at hand. A
computer at New Jersey's Ocean County College in
Tom's River is now programmed with 44,000 of the
most-used English words paired in traditional and
simplified spellings for automatic transliteration.
The Need for Reform

Serious attention to reform is growing as more
and more people realize its social implications at
home, and its importance to the spread of English
abroad as an international "second language." Thus
an urgent need arises for those willing to accept
even a small measure of reform to speak up for it,
to talk about it, to build public awareness in
the same way that environmentalists hammered home
the air and water-pollution story. Perhaps only
when voters demand it will Congress require manufacturers to build typesetting machines that produce various steps in rational spelling -- just as
auto makers are required to build pollution-free
exhausts.
Many Phonetic Languages Already

Perhaps we cannot make reading and writing quite
as simple as finger painting, but we can come closer
now; much closer. We can do it by spelling English
rationally, regularly, phonetically -- like Italian,
Spanish, Dutch, German, Finnish, Russian, Hungarian,
Turkish, Swedish and other languages where spelling
is so logical and easy to learn that it's not taught
after the first few months of first grade. We owe
it to future generations to bring the visual part
of reading and.writing as easy and simple as possible; to turn the rudder of our wayward orthography a few degrees so that spelling can be inched
back on course until, along with other western languages, our written forms are in synchronism with
our spoken words.
Before hastily saying no to spelling reform we
should examine the new tool that can make the
change palatable to adults and a boon to children.
This tool is waiting in the wings -- waiting to
be discovered by the right people.
Computerized transliteration lends itself equally well to an instant change, or to a gradual "stepby-step" shift. There exists today among. spelling
reformers general agreement that, as a first step,
the clear short vowel sound "e" should be written
"e" in such words as "frendly, meny, hed, sed,
heven," and so on. That is where reform can begin.
Experience with this first step will determine
which of several choices should be next. Perhaps
an obvious change like "k" for "ch" in words like
"kemistry, and skool"; or "ee" for the long vowel
in "cleen, leed, seet," etc. Other obvious improvements would carry us through a dozen or more
early steps. Then the choice of improvements may
get a bit difficult, and call for a balancing of
alternatives.
Meny Right Ways of Spelling

What about personal or business letters and
handwritten notes that never get into print? When

COMPUTERS and PEOPLE for March, 1978

CHART 1
Sample of the Way English Would Appear for Several Stages of Soundspel

Have you ever considered the meny benefits of a simplified phonetic spelling that
sounds just like it's written? A spelling that children, adults and foreign students
can learn quickly, without laborious memorizing. Most countries have such a spelling"
We could have it too. The first writers rigidly matched letters to sounds, but those
who came after them polluted the system, botched up its simplicity and, for no good
reason at all, left us with several hundred different ways to spell our 43 simple sounds!
Let's go back to phonetic spelling and give our children a real hedstart. Let's give
them tools to read and write enything they can hear or say. And now, at last, it can
be done without adult re-schooling because computer magic will do the tough part for
us-automatically. Interested? Read on ...
The spelling in the paragraph above is very slightly simplified.
It represents the first step in a series of step-by-step simplifications.
The paragraph below is semi-simplified. It represents about
the mid-point or 20th step in a series of simplifications.

Hav you ever considered the meny benefits ov a simplified fonetic speling that
sounds just like it's riten? A speling that children, adults and forin students
can learn quickly, without laborius memorizing. Most cuntryz hav such a speling.
We could hav it too. The first rieters rijidly matched leters to sounds, but those
hoo' came after them polooted the sistem, botched up its simplisity and, for no good
reeson at all, left us with several hundred diferent ways to spel our 43 simpl sounds!
Let's go back to fonetic speling and giv our children a reel hedstart. Let's giv
them tools to reed and riet enything they can heer or-say. And now, at last, it can
be dun without adult re-skooling because computer majic wil do the tuf part for
us-automaticaly. Interested? Reed on ...
The paragraph below is fully simplified, completely phonetic.

Hav u ever considerd th meny benefits ov a simplified fonetic speling that
soundz just liek it's riten? A speling that children, adults and forin stoodents
can lurn qikly, without laborius memoriezing. Moest cuntryz hav such a speling.
We cuud hav it too. Th furst rieterz rijidly macht leterz to soundz, but thoez
hoo caem after them polooted th sistem, bocht up its simplisity and, for no guud
reezon at aul, left us with several hundred diferent waez to spel our 43 simpl soundz!
Let's go bak to fonetic speling and giv our children a reel hedstart. Let's giv
them toolz to reed and riet enything thae can heer or sae. And now, at last, it can
be dun without adult re-skooling becauz compueter majic wil do th tuf part for
us-automaticaly. How? Reed on...
COMPUTERS and PEOPLE for March, 1978

21

CHART 2
The Proposed IISoundspel" Key Used in the Transliteration of 44,000 English Words

a

ae

b

ch

at
Jgo

Qit

aa
dot

auto

er

ee

4

cheer

systJmatic

ia
io
iu

Mgm

f
fit

•

g

J

k,c

0

oe

lu~e

hQt
atdm

cat

2.pen

p

q

pet

quit

t

til'

p.n~

!J!is

I

.it
1
easily

1

m

n

h

~ot

kit

hat

•
Ie

4

•

01
oil

00

r

rr

V

~alye

ng
bla.Jket

arrow

OU,OW
out
how

s

sh
shut

sets

m~

sing

or

order
(office)
mem6randum
8

3

editOri~.
champ!Qn
auditoriJ;!:m

net

ooze

red

4

ice

men

let

sorrow
hurry

u
~

thin

W
Ylet

•

saw

eer

5

baker

meet

edit

atl,aw

fair

hard
2
maroon

e

d

-church
-

arr

ar

f§.ther

ElSe

•

wh
whet

ue

ur
~gent

!!Pit
acc~millate

X

10

e~am

e~pert

5

X"

yet
victorY

z

zones

UU
p~t

zh
~ure

4 To keep certain words looking fa.mhiar, final
9 In unstressed syllables 'ue' becomes a very
1 Short vowels (a e i 0) in unstressed syllables
are often given a neutral pronunciation close e may be dropp8d from a sOl,lIldspel word end- short diphthong pronounced lhyu (like the
second 'u' in accumulate).
to the sound "uh" (ago, system, easily, atom). ing in ee (we¢) , ie (alibi¢), oe (go¢).
5 The pronunciation of 'ur' and 'er' is identical.
10 Both 'th' and 'x' have voiced and unvoiced
Phonetists call this diluted sound "schwa".
'ur' is always used in stressed syllables (ur- pronunciations: Voiced th (as in thiS); un2 When 'ar' and 'or' are followed by a stressed
vowel (maroon, memorandum) the a and 0 are . gent), 'er' in unstressed (baker). In casual voiced th (as in thin). The voiced x (a "gz"
pronounced as an unstressed "uh", and the 'r' speech, final and semi-final 'ar' and 'or' are sound as in exam) is always followed by a
often pronounced like 'er' (collar, dobtoral).
vowel; the unvoiced x (a "ks" sound as in box,
begins a new syllable. See note 1 .
6 "n' is pronounced "ng' when followed by k, q, . expert) is never followed by a vowel.
3 The vowel-sound "V2-ee" (half-ee) is heard in
11 At the beginning of a syllable Y is always a
the fIrst e of 'between'. It is never stressed, has or x (blanket, banquet,jinx).
consonant (yet, beyond). At the end· of a sylla7 When '0' is followed by ff, ss, ng, th (office,
about half the duration of ee, and some of the
tonal qualities of short i. At or near the begin- cross, long, cloth) it is always stressed and ble it is always an unstressed vowel (holy, vicning of a word it is written "e' (event, debate, usually pronounced like the '0' in 'or' (or like tory, pityful). See note 3.
Soundspel has two self-evident abbreviations:
reality); further on in the word it is written the "aw' in'saw').
8 When a e 0 u are followed by 'rr' the vowels
u=you, th= the; three traditional spellings:
'y' (pityful, sillyness, victory); and it is written
to= to, do= do, -ful= -ful; and, in keeping with
"i' in the unstressed vowel combinations ia io iu are stressed and keep their normal shortother languages, a lowercase pronoun: i = 1.
vowel pronunciation.
( editorial, champion, auditorium).

22

COMPUTERS and PEOPLE for March, 1978

computers lead the way, the rest of us can follow
at our own pace -- if we want to. Many of us will
pick up the new spelling from the printed page.
Others will continue to write traditionally. No
matter. We need no drive for converts. No one
should ever be urged to update his spelling. Those
who from childhood have spelled traditionally will
always be able to read both ways and to write traditionally -- until our quaint orthography dies a
natural death. That is how it has been in Holland,
Germany, Norway, Denmark, Russia, France, Turkey,
Korea, and other countries where improvements in
spelling have taken place.
Readers Cannot Be Forced But Can Change Slowly

So much for spelling and writing. How about reading? Readers cannot be computerized.
Here we come face-to-face with long established
habits, and we may meet big resistance. We won't
know how much until we try. To minimize reading
resistance we should do everything possible to make
reformed reading easy. The changeover should be so
gradual, so inconspicuous, so natural, so logical
and sensible, so comfortable for the reader, and
introduced so subtly that he is hardly aware of being
enticed away from his childhood spelling (see Chart
1). This is precisely where computers rise to the
occasion. They can slowly but surely feed new spellings into the mainstream of printed matter, feeding
them in so gently that we should have little reason
to be upset. We would be given every chance to adjust comfortably. It would even be po~sible to monitor public acceptance through a series of polls,
enabling us to introduce each ~ew step from coast to
coast or world-wide with shrewd timing.
Perhaps Rapid Acceptance

There is, of course, a good chance that acceptance
could come much faster than we anticipate. Graphic
change is now quite commonplace: You can test this
for yourself by comparing typical posters, magazines,
and advertising today with a similar sampling from
a decade or two ago. You'll be impressed at how
quickly we've adjusted to new visual presentations
without even knowing it. Or look back at the late
'20s when printers introduced a rash of typefaces
with newly designed g's and a's based on a single
circle. The new shapes of these two lowercase letters changes about 40 percent of our "word-pictures"
as traditionally printed and read by successive generations. Yet the change brought no public protest
at all. It is worth noting that typesetters of the
'20s willingly accepted the newly shaped letters
because, so far as they were concerned, the shift
was purely mechanical. The same acceptance can come
with computerized transliteration. These examples
of graphic change are, of course, less formidable
than those of spelling reform. Nevertheless, the
public may take spelling reform in stride.
What then, will trre first transliterating computer
be able to do, and when will it be doing it?
The 44,000 Most-Used Words

An experimental typographic transliterating computer is now programmed with the 44,000 most-used
words in written, contemporary English. This collection of words comes largely from a study completed
in 1961 by Dr. W.N. Francis of Brown University's

Department of Linguistics. It covers a millionword sampling of running text selected from a wide
variety of subjects: news, editorials, the arts,
hobbies, skills, religion, science, biography, memoirs, general fiction, science fiction, humor, romance, mysteries, mathematics, humanities, natural·
sciences, annual reports, government documents,
etc. Proper names and unusual technical terms have,
for the present, been deleted from this list, but
for each deletion a word has been added from the
Merriam-Webster list of 35,000 most-used words or
from the McGraw-Hill list of 20,000. The total
list is substantially a composite of all three
lists. These 44,000 words have been transliterated
into Soundspel (see Chart 2), placed ori magnetic
tape (with traditional and simplified spellings in
parallel) and programmed so that traditionally
spelled input tape will generate a matching output
tape in simplified spelling. The output tape is
compatible with photo-typesetting machines. Complete
typeset pages may now be produced without individual
transliterating or manual rekeyboarding.
The Structure of Soundspel: Where It Comes From

The Soundspel phonetic system used for the transliterating program is a merger of Ripman-Archer
"New Spelling," Godfrey Dewey's "World English Spelling," and certain modifications suggested by the
Typographic Council for Spelling Reform. The pronunciation standard is the broadcasting industry's
"NBC Handbook of Pronunciation," the "Random House
Dictionary of the English Language," or "Webster's
New International Dictionary," whichever sanctions
the least deviation from traditional spelling.
The Push to Make the Change Happen

When our social agencies begin to see how transliterating computers can be used to spearhead spelling change -- so "we the people" can just fall in
behind -- they may speak up for reform. Their voice
is big. It is big enough to get the job done.
Their giant push could start the ball rolling.
Another big push might come from those engaged
in areas where English has become a "second language": foreign trade and commerce, international
communication, and negotiations between nations. A
simpler spelling of English has much to offer here.
And finally we have the parents of our school
children. 25 percent of whom are two to six years
behind grade level in reading and writing; the mothers and fathers of 700,000 dropouts each year, and
the friends of 20,000,000 functionally illiterate
U.S. adults.
While we're enlisting concerned parents, social
agencies, international businessmen, the U.N.,
diplomats and others, we should not overlook the
importance of persuading the printing industry to
seek spelling improvement. Printers -- particularly
graphic designers, type directors, and typographers
-- have spent many years studying the legibility,
and artistry, the graphics and mechanics of the
printed page. They, better than anyone else, know
what makes a page easy to read, what interferes with
reading, and what gives a page warmth. Profound
advantages for many millions of people await the
gradual improvement of phonetic representation Qf
English. It makes sense to use computer power for
this purpose.
0

COMPUTERS and PEOPLE for March, 1978

23

Com'puting and Data Processing Newsletter

DARTMOUTH STUDENTS CAN LOOK FOR JOBS
VIA AN INTERACTIVE COMPUTER
Robert P. Graham
Dartmouth College News Services
303 McNutt Hall
Dartmouth College
Hanover, NH 03755

"Man should set the goal s and tell the computer
how to work towards them" wrote Dartmouth College
President John Kemeny in 1972.
In that philosophy, the Career and Employment
Services at Dartmouth College has utilized a computer to develop a new and different approach to
the usual classified advertisement for jobs.
As of the fall of 1977, Dartmouth students have
computer assistance in their job-hunting efforts.
A new computer program, DART-JOB'~~'~', is now offering students new, more efficient means of finding
local employment.
The program lists odd jobs, part-time jobs, and
full-time leave-term jobs both at Dartmouth and in
the surrounding community. The program presents the
student with an accessible, up-to-date body of information.
In order to use DART-JOB***, a student merely
calls up the program on one of the college!s 300
computer terminals. Then, in a "conversational"
exchange with Dartmouth's interactive computing
system, he asks for the particular type of job he
wants. The computer then prints out all available
jobs of that type, describing each individual job,
its requirements, the period of employment, the
hours per week, the pay, and presents the address
and telephone number of the contact person.
Conversely, the program offers an employer the
opportunity to reach a large percentage of the student body. Any college or local employer can list a
a job opening with the service at no cost. To have
a job listed with DART-JOB***, an employer either
fills out an advertisement form and sends it to
Career and Employment Services in College Hall, or
he telephones and asks to have the job listed. Listings are updated daily.

print various categories of odd jobs available. The
student then selects a category (office work, physical labor, baby-sitter, etc.) and the computer
prints all available jobs-in that category. The
user can then continue in this manner until he finds
a job that he is interested in.
In addition, a student is not restricted by office
hours. Employment information is available for the
20 hours a day during which the computer operates.
Figures indicate that in the first month of operation more than 50 percent of DART-JOB*** use was
after regular office hours.
The program was researched and designed by Ginny
Darrah of Nor~ich, Vt., with the assistance of Eve
Pratt of Longmeadow, Mass., and Carl Worrell of Montreal, Que., both members of the Class of 1979 at
Dartmouth. They initially advertised the program
within the college community, emphasizing that DARTJOB*** could be used for department or office requirements or for personal use, such as the need
for a baby-sitter or for help around the house. In
January, Career and Employment Services will begin
advertising within the Upper Valley business community to make local businesses aware of the potential of DART-JOB***.
The concept behind DART-JOB*** may have important implications in the use of the computer in a
college community with computer resources similar
to Dartmouth's Time-Sharing System. It is proving
an efficient. easier way to make a centralized body
of information available throughout the college.
CONTINUED GROWTH FOR THE COMPUTER INDUSTRY
FORECAST FOR 1978
Gerald G. Probst, Pres.
Sperry Univac Division
Sperry Rand Corporation
P.O. Box 500
Bluebell, PA 10422

During 1978 the general purpose computer market
is expected to follow the growth patterns of recent
years. Our forecast is that gross shipments by all
manufacturers world-wide will grow in the range of
16 percent in 1978 over the prior year increasing
from a value of $13 billion in 1977 to more than
$15 billion in 1978.

Before DART-JOB':'~'~', students had difficul ty obtaining all information on all available jobs. In
the past, jobs were listed in books, and students
could browse through books of listings that were
cumbersome and difficult for the office to organize
and keep updated. Information on many jobs was available to students only by making the rounds of all
potential employers in the community.

This growth will come from expansion of existing
computer installations, new applications, greater
user development of computer-communications systems,
increasing usage of data base management systems
and expansion of both teleprocessing and distributed data processing networks.

Now a student can quickly get a full list of only
the type of job of interest. For example, if he or
she is interested in odd jobs, the computer will

1977 has been another successful year for Sperry
Univac, with computer revenues currently approaching 50 percent of the total revenue of Sperry Rand
Corporation. Based on results for the first half

24

COMPUTERS and PEOPLE for March, 1978

of the current fiscal year, Sperry Univac is expected
to establish new records in terms of revenue, bookings and shipments for the full year.
Although the western European nations did not recover as fast from the last recession as had been
anticipated in 1977, the United States was a particularly strong market throughout the year for Sperry
Univac. The Middle East continued to be a rapidly
developing new market with a number of significant
orders received from Iran. In South America, Brazil
continued to be a strong market.
A major event of the year for Sperry Univac was
our entry into the minicomputer market -- the fastest
growing segment of the computer industry with a current growth rate in shipments averaging over 30 percent for the industry as a whole.
Our acquisition of Varian Data Machines, now known
as Sperry_Univac Mini::-C()mputer Operations (MeO), has
significantly expanded our capabilities for developing, manufacturing and marketing minicomputers both
in the United States and in international markets
abroad.
We are targeting a higher growth rate for MCO over
the next five years than the average for the minicomputer industry from greater penetration of both
existing markets and new marketing areas. We will
continue to pursue the traditional minicomputer markets and, in addition, will place strong emphasis on
using MCO products in distributed processing networks
in conjunction with our larger systems.
Another important milestone was our entrance in
January this year into the small business system
market with the introductiori of the BC/7 small business computer and its planned further extension into
a complete family covering the needs of the small
business marketplace. Within a short period of time
we created an entirely new nation-wide sales and
support organization dedicated to this market and
product. The results to date have fully justified
our commitment to this market, and led to the release
of the BC/7 to the Canadian market in September of
1977.
In addition to the BC/7, we made several important additions to both our 1100 series and Series 90
computer families during the year. In the 1100 Series, we announced an entry level 1100/83 and 1100/84.
The Series 90 line was expanded with an entry level
90/25 system and two new systems at the high end of
this family -- the 90/80-2 and the 90/80-3.
All of these new products maintain the price/performance advantages that Sperry Univac has traditionally enjoyed over the competition.
The incoming rate of new orders for all of our
products has been in line with or above our forecasts.
In particular, our largest system, the 1100/80, has
been exceptionally well received. World-wide demand
has boosted the order rate for the 1100/80 more than
200 percent above the plan for the year. We are confident that the impetus generated by this system will
continue strongly in 1978.
One of the primary industry thrusts for Sperry
Univac continues to be manufacturing -- users have
been exceptionally receptive to the SPERRY UNIVAC
UNIS software package for manufacturing control. We

are constantly providing new enhancements to UNIS
in order to give our customers even greater capabilities for their applications. Among major companies
ordering large-scale systems utilizing UNIS in 1977
were Raybestos-Manhattan, Inc., the Fafnir Bearing
Division of Textron, Inc., and the Eureka Company.
State and local governments also continue to be
a major market. Sizeable orders were received, for
example, from the New York State Department of Social Services, the Texas Department of Human Resources, the Treasury of the State of Queensland, Australia, and the cities of Seattle in the United
States and Kyoto in Japan.
Airlines, traditionally a strong market area,
were also in the forefront of bookings with substantial orders being placed by Scandinavian Airlines,
Trans-Australia Airlines, United Airlines, and Wardair of Canada.
The world-wide financial community has become a
growing success area for Sperry Univac. During the
year significant orders were obtained from Trustee
Savings Bank in the United Kingdom, the National
Bank of Iran (Bank Melli), Banco Popular Espanol in
Spain, Yasuda Trust and Banking Company in Japan,
and California Federal Savings and Loan in the United States.
We have continued our considerable investments
in research and development during the year in such
areas as bubble memory development, fibre optics,
and voice input and output. In addition, our extensive software development program has resulted
in numerous enhancements to existing operating systems and programs as well as the creation of new
application packages and work in such important
areas as the privacy and security of information.
This year about 8 1/2 percent of our total revenues
was invested in research and development to give
us one of the highest R&D-to-sales ratios in the
industry.
In terms of new facilities, we will be consolidating all of our existing ISS disc memory system
plants in the San Francisco Bay area into a new
400,000 square foot facility in Santa Clara. In
Winnipeg, Canada, we opened a new Defense Systems
Division Facility which will produce electronic devices to be used by the Canadian Defense Forces.
Overseas, a new complex of two multi-storied
buildings has been completed in London, consolidating
the various headquarters of our operatIons based in
the United Kingdom including the International Division and the U.K. subsidiary company. We also opened at year's end a new Sperry Univac Executive Centre near Nice, France for holding international
seminars for senior executives in business, industry
and government. The Centre, succeeding a previous
facility in Rome, Italy, was built to cope with the
growth needs resulting from the increasingpopularity among administrators and businessmen for the
information exchanges we offer.
Despite the prediction of some economists of an
economic downturn in 1978, we are looking forward
to another good year. Past experience has not shown
any close parallel between the growth of the computer market and the strength of general business conditions. On the contrary, in recessionary periods
business and industry strive more than ever to be-

COMPUTERS and PEOPLE for March, 1978

25

come more efficient in their operations and look to
computers to playa leading role in reducing costs
and extending the opportunities for potential growth.

laboratory revenue from practically the same test
volume that existed with the manual system, which
required billing data to be hand-carried to the
business office. The hospital runs about 1.5 million tests annually.
\

On February 3, 1978, a new international conference center was opened by Sperry Univac near Nice on
the French Riviera.

Mercy Hospital management spent about three years
studying computerized laboratory information systems
before choosing PATHLAB, a system manufactured by
the Medlab Company, a division of Control Data Corporation.

Known as the Sperry Univac International Executive
Centre, the multi-million dollar facility is designed
for seminars presenting the latest techniques of
management science to leaders of business, industry
and government. It supersedes a previous Sperry
Univac Centre near Rome, Italy, and accommodates 50
guests.
The purpose of the Centre is to provide a forum
where senior executives from a variety of management
disciplines can exchange ideas with executives from
other countries. The location is removed from dayto-day business pressures, on a 2.8 acre site at
St. Paul de Vence, in the mountains about 10 miles
north of Nice.
Conference facilities, equipped with the latest
audio-visual and translation equipment, are designed
to encourage a free-and-easy dialogue between speakers and guests.
The new facility is expected to accommodate over
4500 guest days per year -- triple the capacity of
the previous center in Rome, which opened in 1968.
There, more than 6500 guests attended seminars covering such topics as "Real-Time Banking Today and Tomorrow," "Developments in the Field of Medicine," and
"The Mechanics of Decision." Speakers have included
ex-Democratic Senator Eugene McCarthy of Minnesota;
Lord Harlech, a former British Ambassador to the
United States; and Vance Packard, sociologist and
author.
A center similar to the French facility is operated in Iiu, Japan by ~ippon Univac Kaisha Ltd., the
Sperry joint venture computer marketing organization
in Japan.
COMPUTERIZED LABORATORY INFORMATION SYSTEM
BRINGS EIGHT PERCENT REVENUE INCREASE TO
IOWA HOSPITAL

Patricia A. Conway
Control Data Corp.

Box 0
Minneapolis, MN 55440

A computerized laboratory information system has
produced an eight percent revenue increase for Mercy
Hospital in Des Moines, Iowa. The increase came from
more accurate reporting of patient test data. This
occurred after the laboratory computer was linked to
the one in the business office for automati c transfer of information for billing purposes as well as
management reports.
Originally, the hospital looked at the link as
merely a desirable level of automation, but unless
the laboratory computer could communicate on-line with
the business computer, the investment would not be a
significant improvement to the overall procedure.
But after less than a year' of operation, a comparative study showed an eight percent increase in

26

Lashing together two different types of computers
the IBM business system and the scientificallyoriented Control Data SYSTEM 17, which is the heart
of the PATHLAB system -- was not a usual procedure.
Nor had such integration been attempted previously
in any similar environment. Highly sophisticated
software programs as well as some intricately designed hardware were developed from the ground up.
A cable connection, in lieu of more expensive tele~
phone lines, was installed between the CDC SYSTEM
17 and the IBM business computer. The two systems
are about 1,000 feet apart and on different floors
of the hospital. As a result, all patient test data
necessary for billing and management reports flows
automatically between the SYSTEM 17 and the IBM
computer without, human intervention.
The PATHLAB computer also operates on-line to
Mercy's existing laboratory test equipment. Simple
interface equipment made it possible for the various
test devices to relay findings directly to the computer.
In addition, the laboratory computer handles test
preparation data such as reading doctors' test orders from mark-sensitive cards and formatting them
into wo.rkli sts. Nursing personnel use these to
schedule patients to test areas. , This same information is printed on perforated adhesive labels
which technicians attach to bottles as they collect
specimens from patients. The computer even arranges patients' room numbers according to a convenient
"route" through the hospital to expedite collecting
specimens.
As patients progress through a series of tests,
the results are automatically processed into their
records and stored on the computer. These records
are printed-out daily and delivered to the medical
floors. Nurses no longer need to record test results, since the computer printout is sized to fit
the patient charts.
Installation of the PATHLAB system is part of
Mercy's building-block approach to a completely
computerized, integrated hospital information system. The hospital has 500 beds, admits more than
18,000 patients annually and handles another 33,000
as outpatients.
SUIT ALLEGING ILLEGAL TIE-IN BETWEEN
BANKING AND DATA PROCESSING

Richard C. Reed
Statistical Tabulating Corp.
2 North Riverside Plaza
Chicago, IL 60606

The Northern Trust Bank in Chicago has been sued
for $50,000 in Federal District Court by~Statistical
Tabulating Corporation (STAT:TAB). The suit alleges
(please turn to page 18)

COMPUTERS and PEOPLE for March, 1978

GAMES AND PUZZLES for Nimble Min·ds ... and Computers
Neil Macdonald
Assistant Editor
It is fun to use one's mind, and it is fun to use the
artificial mind of a computer. We publish here a variety
of puzzles and problems, related in one way or another to
computer game playing and computer puzzle solving, or

to the programming of a computer to understand and
use free and unconstrained natural language.
We hope these puzzles will entertain and challenge
the readers of Computers and People.

NAYMANDIJ

NUMBLES

In this kind of puzzle an array of random or pseudorandom digits ("produced by Nature") has been subjected to a
"definite systematic operation" ("chosen by Nature") and
the problem ("which Man is faced with") is to figure out
what was Nature's operation.
A "definite systematic operation" meets the following
requirements:. the operation must be performed on all-the
digits of a definite class which can be designated; the result
displays some kind ,of evident, systematic, rational order and
completely removes some kind of randomness; the operation
must be expressible in not more than four English words.
(But Man can use more words to express it and still win.)

A "numble" is an arithmetical problem in which: digits
have been replaced by capital letters; and there are two
messages, one which can be read right away and a second
one in the digit cipher. The problem is to solve for the
digits. Each capital letter in the arithmetical problem
stands for just one digit 0 to 9. A digit may be represented by more than one letter. The second message,
which is expressed in numerical digits, is to be translated
(using the same key) into letters so that it may be read;
but the spelling uses puns, or deliberate (but evident) misspellings, or is otherwise irregular, to discourage cryptanalytic methods of deciphering.

NUMBLE 783

NA YMANDIJ 783
1 248 040 5 457 268 6 1 3 7 3
3 1 101 162 2 2 4 658 3 7 624
8 8 2 2 3 6 247 8 2 4 208 5 792
8 6 8 0 1 2 0 1 2 5 3 2 0 308 8 7 3
53271 2 509 5 0 2 0 3 4 0 9 8 9
3 7 9 8 0 2 0 580 3 2 7 4 7 405
2 6 8 8 7 6 2 1 3 4 2 8 652 527 1
8 5 5 2 8 342 2 2 341 530 3 5 2
87135 638 7 620 3
4 8 450
0
2 1 044 7 1 6 7 5 8 245 7 6 8

7
3
3
3
4
6
0
8
8
5

x

G OLD
N OW

R R L 0
N DGW
D N
L
R S L N I 0
30984 00044 45

MAXI MD IJ
In this kind of puzzle, a maxim (common saying, proverb,
some good advice, etc.) using 14 or fewer different letters
is enciphered (using a simple substitution cipher) into the
10 decimal digits or equivalent signs for them. To compress
any extra letters into the 10 digits, the encipherer may use
puns, minor misspellings, equivalents like CS or KS for X
or vice versa, etc. But the spaces between words are kept.

We invite our readers to send us solutions. Usually
the (or "a") solution is published in the next issue.

SOLUTIONS
MAXIMDIJ 782: The future is bought by the present.
NA YMANDIJ 782: Make twelve 99's.
NUMBLE 782: A lie has short legs.

MAXIMDIJ 783

~v.z,

*U1re~

-R- .....
-A-Q''-AI*:I

VlJ,
7rt~

Our thanks to S. Shulman of Edison, N.J. for sending
us the following solutions: Maximdij 781, Naymandij
781, Numble 781.

COMPUTERS and PEOPLE for March, 1978

27

COMPUTER GRAPHICS AND ART
COMPUTER GRAPHICS and ART is a new international
quarterly of interdisciplinary graphics for graphics people and
computer artists. This new periodical is aimed at students,
teachers, people from undergraduate and graduate institutions,
researchers, and individuals working professionally in graphics.
Its topical coverage is broad, embracing a variety of fields.
It is useful, informative, entertaining, and current.
Send your manuscripts, papers, art, and ideas to:
Here Are Some Samples:
learning Through Graphics
by Dr. AI Bork, University of California, Irvine, California
A ten·year forecast for computers, education, and graphics
by a leading authority.

Editor, COMPUTER GRAPHICS and ART
Berkeley Enterprises, Inc. - Chico Branch
555 Vallombrosa - No. 35
Chico, California 95926

Art of the Technical World
by Dr. Herbert Franke, Munich, Germany
Computer art as the bridge between the two realms of
art and leisure.
Expanding the Graphics Compatability System to Three Dimensions
by Richard F. Puk, Purdue University, Lafayette, Indiana
Design considerations for a user·oriented 3·D graphics system.
A Personal Philosophy of Ideas, New Hardware, and the Results
by Duane Palyka, University of Utah, Salt Lake City, Utah
The frame·buffer from Evans and Sutherland allows the
artist to treat the computer as a paint and brush medium.
How to Build Fuzzy Visual Symbols
by Alex Makarovitsch, Honeywell Bull, Paris, France
A new approach to computer art and graphics by a
computer scientist.
The State of the Art of Computer Art
by Grace C. Hertlein, Editor
Comparisons of early computer art and today's newer art.
What is art? What is art in computer art?
Inexpensive Graphics from a Storage Cathode Ray Tube
by Charles J. Fritchie and Robert H. Morriss, Tulane University,
New Orleans, Louisiana
Illustrations and photographic techniques used to achieve
graphics from a storage tube CRT.
An Investigation of Criteria for Evaluating Computer Art
by Thomas E. Linehan, Ohio State University, Columbus, Ohio
The new aesthetic of computer art requires a departure from
the previous, formalist-traditionalist doctrines for evaluating art.

List of Coverage for Up-Coming Issues
Applied Arts and Graphics
Architectural Graphics
Cartography Systems
Computer-Aided Design
Computer Assisted and Managed Instruction
Utilizing Computer Graphics
Computer Graphics in Physics, Chemistry,
Mathematics, etc.
Computer Programs for New Applications
Display Systems and Graphics
Fine Art and Media Explorations
Graphics in Business
Hardware Systems and Graphics
Interactive Graphics Languages and Systems
Languages for Computer Graphics and
Graphics Primitives
Software Systems and Graphic Requirements
Statistical Packages and General Graphing
Syllabi for Computer Graphic Courses

tJ;wl ~

- - - - - - - - - - - - - - - - - - - - - - - - -(may be copied on any piece of paper)- - - - - - - - - - - - - - - - - - - - - - - To: COMPUTER GRAPHICS and ART
HERE IS YOUR OPPORTUNITY FOR FEEDBACK TO US:
Berkeley Enterprises, Inc. - Business Office
) I hope to submit for publication in CG&A material on the following
815 Washington St.
topics : ________________________________________
Newtonville, Mass. 02160
) Please enter my
CG&A ($10 per
) Please enter my
($13 per year).
) Please enter my
($15 per year).

PERSONAL (U.S. and Canada) subscription to
year).
FOREIGN PERSONAL subscription to CG&A

) I am interested in reading materials by the following authors:

) I am particularly interested in coverage of the following subjects:
LIBRARY/DEPARTMENTAL subscription to CG&A

) Enclosed is my PERSONAL CHECK AND/OR PURCHASE ORDER
for CG&A.
) Enclosed is $2.50 for a sample copy of CG&A (applicable toward a
subscri ption).
FULL REFUND IN 30 DAYS IF NOT SATISFACTORY

Name ___________________________________________________
Title _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ _ __
Organ ization _____________________________________
Adqress _ _ _ _ _ _+-_________________

) I would like to receive materials on other Berkeley Enterprises, Inc.
publications: ( ) COMPUTERS and PEOPLE ( ) The COMPUTER
DIRECTORY and BUYER'S GVIDE ( ) People and the
PURSUIT of Truth ( ) The Notebook on COMMON SENSE and
WISDOM ( ) WHO'S WHO in COMPUTERS and DATA
PROCESSING ( ) Books
) I am interested in: ( ) black and white computer art reprints at low
cost (a bonus for subscribing to CG&A) ( ) 77 page FORTRAN
IV art manual ( ) 45 page interdisciplinary graphics bibliography
by G. Hertlein
) Additional Comments (attach another paper if needed): _ _ _ __



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.3
Linearized                      : No
XMP Toolkit                     : Adobe XMP Core 4.2.1-c043 52.372728, 2009/01/18-15:56:37
Create Date                     : 2011:05:26 13:24:42-08:00
Modify Date                     : 2011:05:26 13:14:53-07:00
Metadata Date                   : 2011:05:26 13:14:53-07:00
Producer                        : Adobe Acrobat 9.43 Paper Capture Plug-in
Format                          : application/pdf
Document ID                     : uuid:68c48fdf-c3d4-4184-aa33-ec02637573d6
Instance ID                     : uuid:7a74c681-5573-4b8d-abf7-52e6045224e3
Page Layout                     : SinglePage
Page Mode                       : UseNone
Page Count                      : 28
EXIF Metadata provided by EXIF.tools

Navigation menu