computers and people formerly Computers and Automation September, 1975 Vol 24, No. 9 CAVERN BECOMES COMPUTER/ZED WAREHOUSE Computer Technology and Surveillance Anti-Monopoly and Pro-Competition Federal Government Data Processing: Considerations of Policy The First "No Software" Computer The Future of Computing: Is the Sky the Limit? Word Processing and the Computerized Office — Paul Armer — A. G. W. Biddle — Dr. George E. Mueller — John Peers and Gerard Horgan — Frederick J, Bethke — Elizabeth deAtley LOS CA ST The Notebook on COMMON SENSE, ELEMENTARY AND ADVANCED is devoted to development, exposition, and illustration of what may be the most important of all fields of knowledge: WHAT IS GENERALLY TRUE AND IMPORTANT = COMMON SENSE TECHNIQUES FOR AVOIDING MISTAKES SOME PARTS \ OF OPERATIONS RESEARCH / JS JUDGEMENT AND MATURITY + SCIENCE IN GENERAL + TECHNIQUES FOR SOLVING PROBLEMS { SOME PARTS \ / AVOIDANCE \ + I SYSTEMS I "^ I LOGICAL I + " V ANALYSIS J \ FALLACIES J PURPOSES: to help you avoid pitfalls to prevent mistakes before they happen to display new paths around old obstacles to point out new solutions to old problems to stimulate your resourcefulness to increase your accomplishments to improve your capacities to help you solve problems to give you more tools to think with 8 ^^REASONS TO BE INTERESTED IN THE FIELD OF COMMON SENSE, WISDOM, AND GENERAL SCIENCE COMPUTERS are important - But the computer field is over 25 years old. Here is a new field where you can get in on the ground floor to make your mark. MATHEMATICS is important - But this field is more important than mathematics, because common sense, wisdom, and general science have more applications. LOGIC is important — But this field is more important than logic, because common sense plus wisdom plus science in general is much broader than logic. WISDOM is important - This field can be reasonably called "the engineering of wisdom". COMMON SENSE is important - This field includes the systematic study and development of common sense. SCIENCE is important - This field includes what is common to all the sciences, what is generally true and important in the sciences. MISTAKES are costly and to be AVOIDED - This field includes the systematic study of the prevention of mistakes. MONEY is important — The systematic prevention of mistakes in your organization might save 10 to 20% of its expenses per year. Topic: THE SYSTEMATIC PREVENTION OF MISTAKES Already Published Preventing Mistakes from: Failure to Understand Forgetting Unforeseen Hazards Placidity Camouflage To Come Preventing Mistakes from: Bias Interpretation Distraction Gullibility Failure to Observe Failure to Inspect Prejudice Topic: SYSTEMATIC EXAMINATION OF GENERAL CONCEPTS Already Published The Concept of: Expert Rationalizing Feedback Model Black Box Evolution Niche Understanding To Come Strategy Teachable Moment Indeterminacy System Operational Definition (may be copied on any piece of paper) To: Berkeley Enterprises, Inc. 815 Washington St., Newtonville, MA 02160 ( ) Yes, please enter my subscription to The Notebook on Common Sense, Elementary and Advanced at $12 a year (24 issues), plus extras. I understand that you always begin at the beginning and so I shall not miss any issues. ( ) Please send me as free premiums for subscribing: 1. Right Answers - A Short Guide to Obtaining Them 4. Strategy in Chess 2. The Empty Column 5. The Barrels and the Elephant 3. The Golden Trumpets of Yap Yap 6. The Argument of the Beard ( ) I enclose$ ( ) Please bill my organization RETURNABLE IN 7 DAYS FOR FULL REFUND IF NOT SATISFACTORY HOW CAN YOU LOSE? Name Title Organization Address (including zip) Signature Purchase Order No. COMPUTERS and PEOPLE for September, 1975 "RIDE THE EAST WIND: Parables of Yesterday and Today" by Edmund C. Berkeley, Author and Anthologist Published by Quadrangle/The New York Times Book Co., 1974, 224 pp, $6.95 The Fly, the Spider, and the Hornet Once a Fly, a Spider, and a Hornet were trapped inside a window screen in an attic. For several hours they walked up and down, left and right, here and there, all over the screen. They could look through the screen at the summer woods, feel the summer breezes, and smell the summer smells; but they could not find any hole to pass through the screen to the woods and fields so tantalizingly close, yet so far away. Finally they decided to hold a conference on the problem of get- ting through the screen. The Fly spoke first, and said, "My Col- leagues, .... The Fox of Mt. Etna and the Grapes Once there was a Fox who lived on the lower slopes of Mt. Etna, the great volcano in Sicily. These slopes are extremely fertile; the grapes that grow there may well be the most delicious in the world; and of all the farmers there. Farmer Mario was probably the best. And this Fox longed and longed for some of Farmer Mario's grapes. But they grew very high on arbors, and all the arbors were inside a vineyard with high walls, and # the Fox had a problem. Of course, the Fox of Mt. Etna had utterly no use for his famous ancestor, who leaping for grapes that he could not reach, called them sour, and went away. The Fox decided that what he needed was Engineering Techno- logy. So he went to a retired Engineer who lived on the slopes of Mt. Etna, because he liked the balmy climate and the view of the Mediterranean Sea and the excitement of watching his instruments that measured the degree of sleeping or waking of Mt. Etna. The Fox put his problem before the Engineer .... The Fire Squirrels Scene: Two squirrels, a young one named Quo, and an older one named Cra-Cra, are sitting by a small campfire in a field at the edge of a wood. Behind them hung on a low branch of a tree are two squirrel-size hammocks. Over each of the hammocks is a small can- opy that can be lowered to keep out biting insects. It is a pleasant summer evening; the sun has just recently set, and the stars are com- ing out: Quo: Cra-Cra, you know I don't believe the old myths any more. Tell me again how it really happened. Cra-Cra: Just this: we received our chance because they dropped theirs. It is as simple as that. Quo: In other words, they were the first animals to use tools, and we are the second? Cra-Cra: Yes. There is a mode of surviving in the world .... COMPUTERS and PEOPLE for September, 1975 Missile Alarm from Grunelandt Once upon a time there were two very large and strong coun- tries called Bazunia and Vossnia. There were many great, impor- tant, and powerful leaders of Bazunia who carefully cultivated an enormous fear of Vossnia. Over and over again these important and powerful leaders of Bazunia would say to their fellow coun- trymen, "You can't trust the Vossnians." And in Vossnia there was a group of great, important, and powerful leaders who pointed out what dangerous military activities the Bazunians were carrying on, and how Vossnia had to be militarily strong to counteract them. The Bazunian leaders persuaded their countrymen to vote to give them enormous sums of money to construct something called the Ballistic Missile Early Warning System, and one of its stations was installed in a land called Grunelandt far to the north of Bazunia. Now of course ballistic missiles with nuclear explosives can fly any kind of a path all around a spherical world, and they do not have to fly over northern regions. But this kind of reasoning had no influence on the leaders of Bazunia who wanted the money for building BMEWS. Nor did it have influence on their country- men, who were always busy, trying to make money — in fact often too busy to think clearly .... 52 parables (including fables, anecdotes, allegories) 23 never published before 27 authors 18 full-page illustrations 330 quotations and maxims 7 Parts: The Condition of Man / On Flattery and Persuasion / On Perseverance and Resourcefulness / Behavior — Moral and Otherwise / The Problem of Truth / On Common Sense / Problem Solving THE VALUE OF THIS BOOK TO YOU CAN BE VERY GREAT JUDGE FOR YOURSELF AT NO COST RETURNABLE IN 10 DAYS FOR FULL REFUND IF NOT SATISFACTORY You can read it all in 10 days — and keep it only if you think it is worth keeping. HOW CAN YOU LOSE? t (may be copied on any piece of paper) To: Berkeley Enterprises, Inc. 815 Washington St., S9, Newtonville, MA 02160 ( ) Please send me copy(ies) of Ride the East Wind: I enclose $7.00 per copy (includes handling). Total enclosed ' (Prepayment is necessary) My name and address are attached. Vol. 24, No. 9 September, 1975 Editor and Edmund C. Berkeley Publisher Assistant to Judith P. Callahan the Publisher Assistant Barbara L. Chaffee Editors Neil Macdonald Lynne W. Mogilensky Art Editor Grace C. Hertlein Software Stewart B. Nelson Editor Contributing John Bennett Editors John W. Carr III Grace C. Hertlein Linda Ladd Lovett Ted Schoeters Richard E. Sprague Edward A. Tomeski London Thomas Land Correspondent Advisory Ed Burnett Committee James J. Cryan Beverly Hunter Editorial Berkeley Enterprises, Inc. Offices 815 Washington St. Newtonville, MA 02160 617-332-5453 Advertising The Publisher Contact Berkeley Enterprises, Inc. 815 Washington St. Newtonville, MA 02160 617-332-5453 "Computers and People," formerly "Computers and Automation," is published monthly, 12 issues per year, at 815 Washing- ton St., Newtonville, MA 02160, by Berkeley Enterprises, Irtc. Printed in U.S.A. Second Class Postage paid at Boston, M^A, and addi- tional mailing points. Subscription rates: United States, $11.50 for one year, $22.00 for two years. Canada: add $1 a year; elsewhere, add $6 a year. NOTE: The above rates do not include our publication "The Computer Directory and Buyers' Guide". If you elect to re- ceive "The Computer Directory and Buyers' Guide," please add $12.00 per year to your subscription rate in U.S. and Canada, and $15.00 elsewhere. Please address mall to: Berkeley Enter- prises, Inc., 815 Washington St., Newton- ville, MA 02160. Postmaster: Please send all forms 3579 to Berkeley Enterprises, Inc., 815 Washing- ton St., Newtonville, MA 02160. © Copyright 1975, by Berkeley Enter- prises, Inc. Change of address: If your address changes, please send us both your new address and your old address (as it ap- pears on the magazine address imprint), and allow three weeks for the change to be made. and people formerly Computers and Automation Computers and Privacy [A] 8 Computer Technology and Surveillance by Paul Armer, Center for Advanced Study in the Behavioral Sciences, Stanford, Calif. How vast amounts of personal and private information can be easily obtained as a byproduct of the development of computers, communications, and electronics, in systems such as electronic fund transfer systems. Computer Programming 18 The First "No Software" Computer: The ADAM® System [A] of John Peers & Co. Inc. Part 1 : Introduction, by Edmund C. Berkeley, Editor Part 2: The Trouble with Computers is ... . People, by John Peers, President, John Peers and Co., Inc., Burl- ingame, Calif. Part 3: An Example of ADAM® - A Simple Inventory Control System by Gerard Horgan, Technical Director, John Peers & Co. Inc. For a business a computer should be a "business logical machine," and should deal with the meanings, the words, and the logic that the business is already using; how a computer can be such a machine. The Computer Industry 12 Anti-Monopoly and Pro-Competition: The Antitrust [A] Enforcement Act of 1975 by A. G. W. Biddle, President, Computer Industry Association, Rosslyn, Va. How the free and competitive business system of the United States is presently threatened by regulatory abuse and monopoly power; the legislative provisions which are needed to remove the threat. 15 Federal Government Data Processing: Considerations of [A] Policy by Dr. George E. Mueller, President, System Development Corp., Santa Monica, Calif. A reasonable and attainable goal should be forty per- cent of governmental data processing activities to be performed by the private sector ; factors affecting the attainment of this goal. 27 Word Processing and the Computerized Office [A] by Elizabeth deAtley, Stanford Research Inst., Menlo Park, Calif. How the desirability of easy editing, repetition, and copying are producing the communicating typewriter and more and more processing of words resembling the processing of data. COMPUTERS and PEOPLE for September, 1975 The magazine of the design, applications, and implications of information processing systems — and the pursuit of truth in input, output, and processing, for the benefit of people. Computers and Applications 32 Warehouse Operation in Limestone Caves Uses Computer [N] by Donald B. Allen, General Automation Inc., Anaheim, Calif. 34 Aeroflot to Use General Automation Minicomputers in [N] Soviet Message Switching Network by John A. Dillon, General Automation, Anaheim, Calif. 34 Multispectral Image Analysis System Extracts Oil Data, [N] Crop Data, Etc., from Satellite Pictures by Margaret McCarvill, General Electric, Bala Cynwyd, Pa. Computers and New Ideas 33 Information Recycling [N] by Information International Inc., Culver City, Calif. Information recycling implies capture of information, updating of the information, and publishing the infor- mation; doing this over and over, as for telephone books, is a critical area of man's knowledge. 6 Wondering, Computing, and Going in New Directions [E] by Edmund C. Berkeley, Editor, Computers and People An argument for more resourcefulness and imagination in pursuing new ideas and new directions for knowledge and technology. 25 The Future of Computing: Is the Sky the Limit? [A] by Frederick J. Bethke, IBM, General Products Division, Palo Alto, Calif. The limits include: the talent for learning how to program; the complexity of problems; and the com- plexity and inflexibility of very large programs. Computers, Puzzles, and Games 35 Games and Puzzles for Nimble Minds — and Computers [C] by Neil Macdonald, Assistant Editor NAYMANDU — A systematic pattern among randomness? NUMBLES — Deciphering unknown digits from arithmeti- cal relations. MAXIMDIJ — Guessing a maxim expressed in digits. 17 Hints for Solving Numbles - Part 1 [C] by Neil Macdonald, Assistant Editor How to track down disguised digits in Numbles, when relations in multiplication are given. 7 On Numbles [F] by Harry E. Easton, Richmond, Va. 7 On Maximdijes [F] by William Ray Jines, Mobil Research and Development Corp., Dallas, Texas Correction: At the end of the second (right hand) column on page 23 of the June 1975 issue, please delete the "square box' and please include: "(please turn to page 29)". Front Cover Picture The front cover shows the entrance to limestone caverns which have been converted into a huge warehouse space of 1.2 million square feet, and are being enlarged every year as more limestone is mined. The warehouse contains large supplies of foods, which are received, inventoried, and dispatched by com- puter. For more information, see the story on page 32. Notices and Announcements Ride the East Wind page 3 The Notebook on Common Sense, Elementary and Advanced page 2 Computer Graphics and Art page 31 People and the Pursuit of Truth page 36 VX<§> 4 ■ '** Key [A] - Article [C] — Monthly Column [E] — Editorial [F] — Forum [N] — Newsletter [R] — Reference NOTICE *D ON YOUR ADDRESS IMPRINT MEANS THAT YOUR SUBSCRIP- TION INCLUDES THE COMPUTER DIRECTORY. *N MEANS THAT YOUR PRESENT SUBSCRIPTION DOES NOT INCLUDE THE COM- PUTER DIRECTORY. COMPUTERS and PEOPLE for September, 1975 EDITORIAL Wondering, Computing, and Going in New Directions A curious mind is always wondering and often in- vestigating. Almost all human beings are born with a great deal of curiosity. But many of them have their curiosity trained out of them, as tired parents and tired teachers say to them, "Never mind why — just do it, there's a good boy (or good girl)." A portion of human beings, however, escape and when adult still have large stores of curiosity. — Why should we have to buy oil? Why isn't the sun a much better source of energy? An ad by ITT in the "Wall Street Journal", of August 9, 1974, said that one of their new mills would convert wood waste into useful energy, recap- turing the sun's heat and light, and would save fully 90 percent of the oil that the mill would burn in a year — 56 million gallons. — In these days of fashionable recycling of waste, why should we waste urine and feces and much water washing them down the drains? An interesting article "Growing Fish in Sewage" by Reg Noble in "The New Scientist" for July 31, 1975, mentions that "Each of us produces about 0.5 tons of urine and feces per year, and another 50 tons of wa- ter is used to wash this down the sewers." Isn't this practice a short-sighted and stupid waste of useful chemicals? — Why can't a computer discover new and inter- esting mathematical ideas? An article in the August issue of "Computers and People" reported on a nontrivial statement in mathe- matics, which is true for the first 2500 consecutive cases, with exactly one exception at case 618. This article was "An Almost- True Theorem Involving Tetra- hedral Numbers" by Herbert E. Salzer and Jeffrey Mogul. Wouldn't it be worthwhile to explore system- atically the borderline territory in mathematics be- tween true statements and almost true statements? — Why not investigate again, efficient computer- assisted ways for translating from one na- tural language like Russian into another na- tural language like English? In 1966 a committee of the National Academy of Sciences produced a report "Language and Machines: Computers in Translation and Linguistics" published by the Academy in Washington, D.C. The committee was the Automatic Language Processing Advisory Committee; the chairman was Dr. John R. Pierce, then of Bell Telephone Laboratories, now retired. They pronounced a verdict on translation by computer from one natural language to another: the report pointed out that a great deal of money had been spent, no great accom- plishments had been produced in the sense of computer- produced translation that could be relied on as telling the actual meaning of what was being said in the for- eign language, and that the supply of human transla- tors had always been adequate. And so the project of language translation by computer has fallen into disrepute. But is this verdict still to be relied on in 1975? A gain by a factor of 10 in the efficiency of auto- matic computer hardware and software should have happened as a result of 9 more years of research and development. Such a change might make this verdict one more statement disproved by the advance of tech- nology. — Why can't we make most if not all the lan- guage of thought calculable like mathematics? See in the August issue of "Computers and People" the article by Lawrence M. Clark, "'All the Language of Thought Calculable Like Mathematics'". A computer of course would be necessary to carry this out. Think what such a computer program if it existed might imply. For example, suppose you are having an argument with Joe Doakes. The computer program would tell each of you the precise meaning of what each of you was asserting. Or you might command such a computer program: "Translate this newspaper report of a speech out of its gobbledy-gook and express it in plain English." The computer program might re- spond "What is being asserted is .... and the reasons for the assertions being made, and the reasons against, are these ....". - The resourcefulness and imagination with which we in the computer field have gone in new directions using the powers of present-day computers, has on the whole been rather narrow, it seems to me. In a few directions, we have traveled with eagerness and hospitality; in most directions, we have not. In the computer field, we need many more resource- ful and imaginative approaches to new ideas. £^c^nrvv\VY\G^. G ■&*JU^ Edmund C. Berkeley Editor COMPUTERS and PEOPLE for September, 1975 MULTI-ACCESS FORUM ON MAXIMDIJES /. From: William Ray Jines Mobil Research and Development Corp. Field Research Laboratory P.O. Box 900 Dallas, Texas 75221 I enclose a list of ten Maximdij problems and also a list of their solutions. These have been tried and solved by some of my fellow scientists at this lab. I have marked the ones (4 f 6, and 7) which I have previously sent you. Problem 2 proved to be extreme- ly difficult. Problem 9 is rather unusual in that two four-lettered words appear in sequence and each is the reverse image of the other. Problem 10 does have an incorrect alternate solution. This little game has caught on here. We've all enjoyed it, and find ourselves counting letters in any expression or maxim we think of. Thank you very much for your previous letter. (1) 1234 56 71484 914 14089 56. (2) 123415 62637 6895 68537 85 62043. (3) 1233244566 76 428 62 123324 74 354 96 78 76 74 02354. (4) 12343 543 6578 1344940 51 035. (5) 123456 47 428 39660. (6) 12 3456 7584 65989 458 189 3456 27508. (7) 1234 56 7 65118 9704 08 1234. (8) 1234 5678 784 5639. (9) 123 3456 6543 78 123 9770. (10) 123 4153 615 783 5190. 2. From the Editor: I am glad that the Maximdij es we have published have provided enjoyment for you all. Thank you for your puzzles and the solutions. (The solutions will be published in the next issue of "Computers and People".) Having cheated and looked at your solutions, I would like to comment that a good Maximdij has a good maxim, one that is reasonably true and one that is worth remembering, so that the solver gets some value out of his work. Your No. 2 is a slogan. No. 3 is not clear to me. No. 10 though said often is I think dangerous and untrue. The remaining seven are I think all good maxims. In the case of the Maximdij es that we publish, we try to select those that are quick and easy to guess. There is more fun I believe in this kind. It is very easy to construct difficult ones. ON NUMBLES /. From: Harry E. Easton P.O. Box 12163 Richmond, Va. 23241 I just gave your July Numble (number 757) to my HP-65. It was an interesting experience. I used the brute force approach, all work and no intelli- gence. It took the poor thing 24 hours to arrive at the answer. Roughly the program was assume WISDOM to be 123456. Dissect the number and store the di- gits equivalent for W,S,D, and M. Multiply WISDOM by S. Dissect the answer and store W'.S'.D'.D", and M'. Compare with letters from the multiplicand. If not equal, increment WISDOM 1 unit and repeat. While it was running I worked out a faster solu- tion. Maybe I can describe it. I had a hard time making the HP-65 understand. 1. Assume A is 9 and M is 1. The units digit of A times M is M. When equal, go to the second equation. If not equal, decrease A 1 unit and store. Repeat until A is 1; increase M 1 unit, store, and make A 9; repeat until match is reached. 2. Assume I is 9. 3. The units digit of I times M is S. This gave me M,A,I,L, and S. About 2 and 1/2 minutes. Assuming W is 1 and substituting for the other letters, I went back to the brute force form- ula and incremented by 10 units. 5 more minutes. And this gave me WISDOM SAILS WITHOUT WIND AND TIDE Thanks for an interesting problem. Now if I can only make the HP-65 do a Maximdij I 2. From the Editor: Your report from the front line trenches of mak- ing a hostile computer solve a Numble is fascinat- ing. — Anybody else with a report? □ COMPUTERS and PEOPLE for September, 1975 Computer Technology and Surveillance Paul Armer Center for Advanced Study in the Behavioral Sciences Stanford, Calif. "Suppose you were an advisor to the head of the KGB, the Soviet Secret Police. Suppose you are given the assignment of designing a system for the surveillance of all citizens and visitors within the boundaries of the USSR. The system is not to be too obtrusive or obvious. What would be your decision?" The state-of-the-art of computer technology — or, putting it somewhat more broadly, about information processing technology — is, I think, a most import- ant sub-set of surveillance technology. I do not pretend to know very much about the technology of bugging and wiretapping; so I will not discuss it explicitly. However, I will be talking about the technology of microelectronics — bugging and wire- tapping depend on that same technology. Measuring Rapid Change People concerned with rapid change often find it useful to have a yardstick for measuring the amount of change. The concept of "an order of magnitude" is just such a yardstick. As you know, an order of mag- nitude is a "factor of ten". We can travel by foot at about 5 miles per hour, by automobile at something like 50 miles per hour, and by Jet aircraft at about 500 miles per hour. Here we have 5, 50, and 500; each of these modes of transportation differs in speed from the previous one by a "factor of ten" or an "order of magnitude". /I/ Thus, the last century has seen a change of two orders of magnitude in transportation speed. The capability of getting around at 50 miles per hour has profoundly affected our way of life. For example, it made the flight to the suburbs possible, and even influenced our culture. As we hear so often, jet travel has shrunk our world tremendously. With the context of two orders of magnitude change in a century before us, let's look at what has been happening with the elec- tronic computer. The Electronic Part of Computers: Speed, Size, Cost The speed of the electronic portion of computers has been increasing by an order of magnitude about every four or five years. During the last decade, the size of the electronics has decreased even faster than that — computers are becoming incredibly small. Most importantly, the cost of raw computer power has declined by an order of magnitude every five to six years, and this trend looks like it will continue for at least another decade. Based on testimony given June 23, 1975, at hearings held jointly by the Subcommittee on Constitutional Rights of the U.S. Senate Judiciary Committee and the Subcommittee on Science and Technology of the Senate Committee on Commerce. Computers are now being manufactured such that the entire processor fits on a single chip about an eighth of an inch on a side. To make the processor more useful you have to add another chip or two, or three, for memory and for communicating with the outside world. Systems of this kind can be purchased today for less than $100. In my classes I often hold up such a device and point out to the students that 25 years ago that amount of computing power would have cost more than $1 million and would have occupied several large rooms . Pyramid Technology and Some Other Analogies Permit me to make another analogy to emphasize this point. It is estimated that the pyramid of Khufu at Giza in Egypt, built in 3000 B.C., required the labor of 100,000 men for 20 years. If the tech- nology of pyramid building had experienced the same increases in speed and decreases in cost as micro- electronics technology has over the last 25 years, a similar monument could be built by 20 men in a single year at a cost insignificant enough to make it reasonable as an outlet for many egos. One needs little imagination to picture how Washington, D.C. would look if this were indeed the case. /2/ We have all seen the impact on our society of an increase in the cost of energy by a factor of two or three. What kind of an impact could you expect from an increase, or reduction, of two or three orders of magnitude — that is, a factor of 100, or 1000? I point out that our society runs on information as well as on energy. Suppose I were able to predict that the cost of an automobile, or of housing, would decrease by a factor of 100 over the next decade? It is quite reasonable to predict that the cost of raw computer power will indeed decrease by a factor of 100 or more in that period of time. There will be several microprocessors in every car; trucks will probably have one at each end of every axle; there will be one in most appliances, and there will be one pasted on the back of every typewriter. I am sure there are countless uses that we don't even dream of today. COMPUTERS and PEOPLE for September, 1975 "First, I would like to say a bit about myself so that you can put my comments into context. I think of myself as a ' computer-nik' . I have been in the computer field since 1947, which was about the time that we began to realize the enormous potentialities of computers for processing infor- mation. From 1947 until 1968 I worked at the Rand Corporation, spending ten of those years as head of their computer science department. I am currently a Fellow at the Center for Advanced Study in the Behavioral Sciences, where I coord- inate a Program on Science, Technology and Society sponsored by the National Science Found- ation. "In 1962 I began to devote time to studying the social implications of information process- ing technology, and since 1971 that has been my major area of concern. Consequently, I am pleased to be here because the impact of infor- mation processing technology on privacy and on freedom has been a concern of mine for more than a decade. I feel that the possible uses of com- puters for surveillance may not yet be fully recognized." Other Computer Costs Lest I leave you with the impression that infor- mation processing is about to become a free good, I must emphasize that I am talking only about the elec- tronic portions of computers — there are many other activities associated with making use of a computer. There are mechanical devices for getting information into and out of computers; there are sensors which measure information such as a person's blood pressure or the acceleration of a truck and then feed the in- formation into the computer. Another significant cost is the cost of programming the computer. Now, the costs of all these other factors are not changing very rapidly, so the total systems' cost is not going to zero; but the cost of the electronics, for all practical purposes, is going to zero. Information Processing and Surveillance Now, what does information processing technology have to do with surveillance? A great deal. However, to my knowledge very little information processing technology has been researched and developed as sur- veillance technology per se; rather, it has been de- veloped with other motives in mind, like improving business data processing or guiding missiles or getting men to the moon. But surveillance is an in- formation processing task Just as much as a payroll application is. If you improve the efficiency of information processing technology for payrolls, you improve it for surveillance. Often systems that are put up for other reasons (as we shall see shortly) can also serve surveillance. Networks Before going to that, I want to talk about several areas of information processing technology which are of particular importance to surveillance. We have heard quite a bit about networks from Mr. Cooke this morning, due to the publicity given to them of late as though they represented a great new technological breakthrough. The first networks consisted of many terminals connected to a single computer. Though there may have been earlier examples, I believe that American Airlines' first seat reservation system went into operation about 1952. It soon became clear that one could just as easily communicate from one com- puter to another as from a terminal to a computer. Interface Message Processors Now, the most sophisticated computer network that I am aware of is the ARPANET, which was described this morning. It was put up by ARPA — beginning in 1968. The ideas behind the network had been known for at least five years ~ ARPA put them together in a system for the first time. As Mr. Cooke told you, the network consists of a number of computers (called "hosts"), communication lines, terminals, and devices called IMPs (for Interface Message Processor). Since there are a number of dissimilar host computers in the network and an even greater variety of terminals, the IMPs must be capable of handling dissimilar host computers and terminals. It has been said during the last month that "setting up a computer network involving virtually any computer, government or private, is almost as easy as making a telephone call". /3/ This statement is dead wrong. First of all, to get into a computer from a network, either the computer must be physic- ally connected to the network, or the network must be able to establish a dial-up connection with the com- puter. Connections of Computers to Communications Most of the computers in operation today are not connected, to any communication system. Of the few that are, most are connected to intra-company net- works, using lines leased from a common carrier; and/ or they may have telephone numbers which can be dialed by a terminal or by another computer. Even if two computers are connected to the same network, un- less host-to-host protocols have been agreed to (and adhered to), no IMP will be able to transfer infor- mation from one computer to another. Now, this is not to say that five government agencies couldn't agree on such protocols, and agree to interconnect their computers, and then pass infor- mation back and forth. Mr. Cooke described just such a system when he described the COINS network earlier. But the notion that one computer could surrepetitious- ly go around stealing information from any unsuspect- ing computer, government or private, is hogwash. Penetration of Computer Systems Five or ten years from now most computers will probably be attached to a network, or be reachable via a telephone number. And most will probably ad- here to a standard protocol. But by then we should have been wise enough to develop safeguards that will make unwanted penetration from the outside difficult and expensive. Note that I didn't say "impossible". Even if two computers are connected to the same network and adhere to a common protocol for exchang- ing messages, the problem of, say, collating together two files on individuals can still be quite diffi- cult. Is Bill Jones the same as William E. Jones? If both records have the same address, it's probably a safe assumption, but if the addresses are differ- ent, you don't really know, for the two records may have been obtained at quite different times. The Universal Identifier For this reason those who face the task of putting such files together would like to have a universal identifier; they usually suggest that we use the Social Security number for this universal identifier. COMPUTERS and PEOPLE for September, 1975 Those who fear the results of the collation of several files into complete dossiers naturally oppose the use of any form of universal identifier. I mention this because I believe it is important that we understand the implications for privacy and surveillance before adopting a universal identifier or permitting the Social Security number to become a universal identi- fier. I don' t mean to imply that computers today are not penetrated by individuals with malevolent intent. One of the more publicized instances of computer crime involved penetration of a telephone company computer used for supplying equipment and spare parts needed by company employees. The penetrator would dial in, order large amounts of equipment, and have it deliv- ered to a location from which he could subsequently remove it. Over time, he obtained equipment worth several hundred thousands of dollars. A Favorite Pastime of Bright Students On university campuses a favorite pastime of bright students is to attempt to penetrate the computer. And they succeed all the time. For the above reasons I believe that those in charge of military security still (with only a few exceptions) will not permit the storage of classified material in a computer which can be accessed from the outside. Thus, if one has personal data files with sensitive information therein, they should be treated like classified material. Let me say a bit more about security in computer systems. Security was recognized as a problem only recently. As a result there are practically no com- puters in use today that were designed and built with the security problem in mind. Security precautions that have been incorporated into computer systems are invariably only in the software, or in control of physical access to the computer and terminals. Soft- ware is indeed soft. Good security requires that both the hardware and the software be designed with security in mind. It is interesting that the sole exception to the above, that I am aware of, other than cryptographic devices, resulted from ARPA-supported research in the MULTICS project at MIT. ARPA has been a major source of support for research on computer security. As you will soon see, I am greatly concerned with the application of information processing technology to surveillance. That being so, why have I defended networks? The answer is simple — I think they have been getting a bad reputation. Interconnection of Government Computers I understand there is some sentiment for legis- lation forbidding the inter-connection of any govern- ment computers. I personally think that's throwing the baby out with the bathwater. If there is concern about the FBI computer being programmed to penetrate the Social Security computers, and the Census Bureau computers, then treat the files of Social Security and the Census like classified information. That is, don't let them be accessible from the outside until the technology exists to satisfy those concerns necessary to safeguarding classified information. But don't generalize to all government computers. Note that the FBI computer is already on a network. While I suspect that as much security was built into that system as could be reasonably purchased at the time, the chief source of leaks from those files is that tens of thousands of law enforcement personnel have a legitimate reason for access to the files. While the wholesale transfer of information may be difficult, individual files can be copied rather easily. Recognition of Spoken Words Let me briefly mention another area of research in information processing which, though being carried out for quite other reasons, is also related to sur- veillance. I refer to speech understanding, some- times referred to as voice recognition. By this I don't mean the identification of the speaker as in voice prints, but rather the recognition by a com- puter of what words have been spoken, so they can be entered and stored in the computer just as though the words had been typed on a terminal connected to the computer. One reason for wanting this capability is so that we can input information into a computer orally. The goals of research in this area today are not terribly ambitious, yet even so, they are elusive. The hope is to get the computer to be able to understand a few dozen words, spoken by a small number of cooperative people whose voice characteristics the computer knows in advance. Listening to Tapes Resulting from Surveillance This technology is related to surveillance because a bug, or a tap, results in miles of tape recordings, most of which is of no interest to the goals of the surveillance. Transcribing all that tape is expen- sive — just listening to it is expensive. I do not mean by the above to suggest I believe that research in speech understanding should be stopped because it might be used in surveillance, though I am aware of computer scientists who have refused to work on such projects for exactly that reason. But, as speech understanding capability increases, we must recognize that surveillance capability does, too. Before leaving this topic I should also observe that the surveillance situation is usually more difficult than recognizing a few words for computer input, because here the speakers are not trying to cooperate and their voice characteristics may not be known in advance. Electronic Funds Transfer Systems Let me now turn to a new topic. Several times I have referred to situations where the technology under discussion was developed for reasons other than surveillance, but it happens that it is useful for surveillance purposes. As a prime example of this I want to talk about electronic funds transfer systems. I can't give you a detailed definition of an electronic funds transfer system (usually referred to as EFTS) because the system hasn't been built. Its final form will be an outcome of intensive com- petition, and also of government regulation. But the general form is reasonably clear. Terminals will exist in stores, hotels, restaurants, etc. (where they are referred to as point-of-sale termin- als), and in financial institutions, including un- attended terminals miles from the nearest office of the institution. In short, terminals will be at any location apt to have a large number of non-trivial financial transactions. Let's look at one way it might work. Say you are about to buy a book. You present your card (some- 10 COMPUTERS and PEOPLE for September, 1975 times called a "debit card", although National Bank- Americard calls theirs an "asset card") to a clerk who puts it into a terminal which reads it and then calls up your bank. If you have enough money in your account, or if your bank is willing to grant you that much credit, the transaction is okayed; your account is debited; and a credit is dispatched from your bank to the book store's bank account. Three Factors that Yield Surveillance Gold The dimensions of the final form of EFTS which are of importance to its potential surveillance capabil- ity are such things as the percentage of the trans- actions recorded; the degree of centralization of the data; and the speed of information flow in the system. Suppose for a minute all transactions over $10 must go through the system and that they are immedi- ately debited to your account in your bank's com- puter. Thus the system not only collects and files a great deal of data about your financial transac- tions — and that means a great deal of data about your life — but the system knows where you are every time you make such a_ transaction . Suppose that the rule for all transactions over $10 is not compulsory, but voluntary. And further suppose that you have gotten into the habit of using the system because: one, it is convenient; and two, it may be cheaper than other payment mechanisms. Now comes an instance in which you want privacy and decide to use cash. If you have to obtain the cash from the EFT system, that cash transaction will stand out like a sore thumb. The point here is that it's not enough just to have the option of using cash, the cash option must be used frequently or it becomes useless as a means for privacy. To give you an idea of how powerful a surveillance system an EFTS would be, consider the following. In 1971 a group of experts in computers, communication, and surveillance was assembled and given the follow- ing task: Suppose you are advisors to the head of the KGB, the Soviet Secret Police. Further, suppose that you are given the assignment of designing a system for the surveillance of all citizens and visitors within the boundaries of the USSR. Further, the system is not to be too obtrusive or obvious. Not only would it handle all the financial accounting and provide the statistics crucial to a centrally planned economy; it was the best surveillance system we could imagine within the constraint that it not be obtrusive. That exercise was almost four years ago, and it was only a two-day effort. I am sure we could add some bells and whistles to increase its effectiveness somewhat. But the fact remains that this group decided that if you wanted to build an unobtrusive system for surveillance, you couldn't do much better than an EFTS. /4/ Prevention of Abuse of EFTS Naturally, the EFTS proponents believe that laws could be written to prevent abuse of the system. I am less sanguine. I'm not concerned about the bankers invading my privacy or using the system for surveillance purposes; but I am afraid that EFTS system operators may be unable to resist pressures from government to let the EFTS be used for sur- veillance. There are in existence today computer systems which could be used in exactly this way, although the number of financial transactions involved is comparatively small. What I have in mind here are the credit authorization systems of National Bank- Americard, Master Charge, American Express, and various check authorization systems. All can have individual accounts flagged. If an individual tries to make a purchase, or tries to cash a check, the system is interrogated. If the account has a special flag the police (or whoever) can be notified where that individual is at that very instant. Check authorization systems are especially subject to such abuse because they depend on the police for infor- mation about bad check passers and for information on forgers for their computer data bases. I have no doubt that such systems have already been so abused. Why Be Concerned? Why should we be so concerned about surveillance? I don't think I can put it any better than Henry Goldberg did in a recent speech: ... 1984 is really a state of mind. If you are always tied to the consequences of your past activity, you will probably adopt a 'don't stick your neck out' attitude. This would create a pressure towards conform- ity, which would, in turn, lead to a society in which creativity would be an early victim and the democratic ideal of a citizenry with control over its own destiny would not flourish for long. /5/ In a recent speech Professor Philip B. Kurland pointed out that we will not celebrate the 200th anniversary of the U.S. Constitution until 1987, and that before we can do so, we must successfully get past 1984. He further said that if he were in charge of some Bicentennial celebration, he would require all participants to read Orwell's "1984" to show what the new nation was created to avoid. /6/ I would extend the advice to those concerned about electronic funds transfer systems. And to "1984" I would add the recently published "The War Against the Jews —• 1933 to 1945" /7/, and Tom Houston's memo on domestic intelligence, which was issued to all American intelligence agencies in President Nixon's name on July 23, 1970. The book "1984" shows what might happen; the latter two documents detail actual events. References 1. Adapted from R. W. Hamming, "Intellectual Implications of the Computer Revolution", Amer. Math Monthly . Vol. 70, No. 1, Jan. 1963. 2. Adapted from W. H. Davidow, unpublished paper presented at a conference of the Computer Society of the Institute of Electrical and Electronics Engineers, Inc., Washington, D.C., Sept. 10, 1974. 3. W. Raspberry, Washington Post , June 18, 1975, quoting Ford Rowan of NBC News. 4. The Center for Strategic and International Studies, Georgetown University, Oct. 29-31, 1971. 5. H. Goldberg, "Impact of the Less Cash, Less Check Society", presented at a meeting of the Computer and Business Equipment Manufacturers Association, May 28, 1975. 6. P. H. Kurland, "The Unlearned Lesson of Watergate", Wall St. Journal . 6/17/75. 7. L. S. Dawidowicz, The War Against the Jews — 1933-1945 . Holt, Rinehart, and Winston, New York, 1975. D COMPUTERS and PEOPLE for September, 1975 11 Anti-Monopoly and Pro-Competition: The Antitrust Enforcement Act of 1975 A. G. W. Biddle, President Computer Industry Association 1911 No. Fort Meyer Dr., Suite 801 Rosslyn, Va. 22209 "The forces within our society are pulling it apart — each striving to get more than the next. Isn't it time to adopt meaningful ways to get our economy and our system back on the right track?" The Computer Industry Association appreciates this opportunity to endorse S-1136, The Antitrust Enforce- ment Authorization Act of 1975. In doing so, we are but one of a growing list of business organizations that are coming to realize the importance of ade- quate enforcement of our antitrust laws. Nature of the Computer Industry Association The Computer Industry Association represents some 35 member companies with combined revenues in ex- cess of $1.5 billion dollars annually. Member firms employ more than 40,000 persons in facilities through- out the United States. They range in size from under a million dollars in annual revenues to something in excess of $300 million. Their products cover the full spectrum of goods and services associates with computers and data processing — mainframes, memories, tape drives, disc drives, printers, data entry de- vices, terminals, software, and services such as leasing, systems consulting and service bureau oper- ations. The Association was formed three years ago this month. Its objective then and now is to endeavor to bring about free and open competition within the com- puter and data processing industries — industries that have, since their inception, been dominated and controlled by a single company. Effect of Dominant Monopoly The Chief Executives and employees of our member firms know what it is like to be subjected to the unilateral use of market power by a dominant mono- poly firm. The economists speak of the anticompeti- tive effects of tying practices, cross subsidization, exclusionary tactics, and other restraints of trade .... our members know about them first hand. They have been required to adapt to a market environ- ment that is ever changing. In part the changes stem from the fast paced technology that is so much a part of our industry; but of far greater importance, the environment is changed and modified by the domi- nant company in our industry whenever it sees its position threatened. Observers of Antitrust Enforcement We have, of necessity, become close observers of the antitrust enforcement process in America. In 1956, the U.S. Government entered into a Consent Decree with IBM after the filing of an antitrust complaint in 1952. The injunctive relief that the Government obtained failed to reach the true, kernel of monopoly power. Thirteen years later, the Anti- trust Division again brought suit. This time the relief sought is structural in nature. Unfortunate- ly it will be at least four more years before we will know whether the courts can effectively reach a judgement that effectively deals with a structural monopoly problem of this complexity and magnitude under current procedures and laws. As our members see it, the free market system in America today is not working as effectively as it should. They view the Antitrust Enforcement Act of 1975 (S-1136) and the Antitrust Improvements Act of 1975 (S-1284) as but two of a number of constructive steps that are needed in our nation's efforts to promote competition and to return to a balanced economic structure where industry can provide the consumer with goods and services at the lowest prices with a fair and equitable return to manage- ment, labor and capital. We believe that American industry is cppable of providing a continuing stream of new products, goods, and services, through inno- vation and the exploitation of American technologi- cal skill. Growing Number of Giant Institutions As citizens, we are alarmed to see the growing number of giant institutions — manufacturing con- cerns, labor unions, financial institutions, as well as state and federal bureaucracies — that have be- come unresponsive to public needs. Rather than being the servants of the people, the concentration of economic, market, and political power has allowed many of these entities to become selfserving and autocratic. This article is based on a statement by the Com- puter Industry Association before the Commit- tee on Antitrust and Monopoly of the Committee on the Judiciary of the United States Senate and the Subcommittee for Consumers of the Senate Commerce Committee; in regard to S-1136 (The An- titrust Enforcement Act of 1975); presented by A.G.W. Biddle, June 10, 1975. 12 COMPUTERS and PEOPLE for September, 1975 Dealing with Monopoly Power Until just recently, the antitrust enforcement process failed to deal with the most serious problem that our antitrust laws were designed to prevent — monopoly power. It would appear that Federal law enforcement has been picking away at the indicia of monopoly power, while leaving the power itself in- tact. Since monopoly power — shared or otherwise — is the basic concern of the Sherman Act, it should be the primary objective of the bulk of our antitrust enforcement efforts. "Baneful Effects" Chief Justice White, in the 1911 Standard Oil de- cision stated that the Sherman Act was designed to protect the public from single company monopolies, and from acts and structures which "although they did not consitute a monopoly were thought to produce some of its baneful effects". Those "baneful" ef- fects — high prices, poor quality of goods and ser- vices, retarded innovation, insurmountable barriers to entry, lack of responsiveness to consumer needs, excessive corporate political power, etc., are all well known to this sub-committee. The emphasis on punishing anti-competitive cor- porate conduct, rather than remedying monopolistic structure and its performance, appears to be deep seated in the institutions which enforce our anti- trust laws. This may be due, in part, to historical accident because both Sections 1 and 2 of the Sher- man Act are criminal statutes. Thus, the law can be seen x as punishing not only predatory conduct like price fixing and market allocations but the struc- turally oriented offense of monopolization as well. Is Domination by a Single Company "Good"? IBM, in its public relations and defense strate- gies, harps on the theme that they "are being pun- ished for being good", thus diverting attention from the more basic and fundamental question — is it in our national interest to have an industry as vital as this one totally dominated by a single company? I sincerely hope that our courts and our antitrust laws can effectively deal with this extremely impor- tant question. How it is decided will largely deter- mine the kind of country this will be in the years ahead, for US v. IBM represents a fork in the road. If IBM' s unilateral power over the computer and data processing industry remains unchecked the barriers to new entry will be impossible to overcome. Many of the companies that exist today will wither and die for lack of capital. To protect the public in- terest, those that remain will probably be placed under some form of federal regulation — and our na- tion moves one step further away from our underlying beliefs in pluralism and free enterprise. Money for Defense by One Company Exceeds the U.S. Budget for Antitrust Activity We need — we must have — more effective enforce- ment of our antitrust laws. But how can we expect to attain this goal if a single corporate defendant can spend more in its defense than is available to the entire Antitrust Division of the Department of Justice? Are our priorities as a nation so out of balance that we can only afford a per capita expen- diture of six cents per year to keep alive the free enterprise system that built America to industrial greatness? I sincerely hope that the answer is no. This legislation calls for a modest increase in the appropriations authorized the Antitrust Division and the Bureau of Competition of the Federal Trade Commission. Over a three year period their respec- tive budgets would increase from a current level of $17 million and $12.5 million to $45 million each. In total, this represents an expenditure of forty cents for every man, woman and child in America. Last week, the Senate authorized $138 dollars per person to protect our citizens from foreign aggres- sors. *Is forty cents too much to spend to protect these same citizens from those who would destroy our freedom of choice rather than face the rigors of free and equal competition? Again, I hope that the answer is no. Threat by Regulatory Abuse and Monopoly Power For the first time in many years, the Congress and the Administration are in accord that our free enterprise system is threatened by regulatory abuse and unrestrained monopoly power in the private sec- tor. With this in mind, we would urge that imme- diate steps be taken to provide for the actual ap- propriation of the proposed funds, rather than merely to authorize them subject to later cuts. Secondly, we would suggest that some considera- tion should be given to extending the life of this authorization. This might be done by providing that, absent further action by the Congress, authori- zations for antitrust enforcement beyond FY 1978 would be automatically adjusted upward or downward in direct proportion to changes in the Gross Na- tional Product in constant dollars. This would in- sure continuity of the enforcement program over time and reduce the likelihood that it would be subject to political pressure. There are some who question whether the amounts suggested by the sponsors of this bill are exces- sive — whether the divisions can spend this much effectively. From our point of view, we believe that they can. However, we do not wish to see a mere escalation of the battle between the Antitrust Division and the Defendant's massed legal power. Rather, we would like to see a substantive improve- ment in the quality of cases brought and a realis- tic reappraisal of the total antitrust enforcement process. In this regard, we believe* that the Con- gress should put the burden of proof on the Anti- trust Division and the Bure-au of Competition. If the monies appropriated are not used, or are car- ried forward, the Congress should know why. Industry Experts 1. Consideration should be given to establishing a new section within the Antitrust Division that would consist of "industry experts" drawn from the private sector. Today, the main thrust of the Division's enforcement effort draws upon the talents of its attorneys and its economists. In the IBM case it has become all too apparent that the Division lacks expertise about the specific industry, the technology, and the impact of various practices upon it. In order to bring a successful suit, and perhaps of even greater importance, to implement a successful relief program, this kind of knowledge is essential. This need is not unique to the IBM case. Similar capabilities will be needed for the AT&T case and other cases that the division may bring with respect to technology based companies. We would think that this section would include personnel drawn from marketing and sales, engin- eering, manufacturing, product planning and accounting. Their participation would provide COMPUTERS and PEOPLE for September, 1975 13 additional perspective to the Antitrust Division in its efforts to identify and properly deal with both monopoly and oligopoly situations in our economy. As a starting point, we would think that this section whould have expertise in the seven indus- tries cited in the Industrial Organization Act. 2. We believe that there would be merit in establishing a similar unit within the Bureau of Competition. However, we would envision that the FTC's section would, in addition, also have personnel drawn from the financial community. Its function would be to assist in the Bureau of Competition's enforcement efforts and be available on call to assist Federal District Court Judges during the relief phase of private Sherman-Clayton actions. Judge Neville, as well as other jurists, has told this Committee of the difficulty that the courts have in coming to grips with the relief question. Similarly, we have observed a growing concern that the relief granted in private anti- trust actions is, in some cases, counter to the total public interest. The assignment of qualified technical and economic experts to the Court would provide the assistance that they so sorely need, while also ensuring greater consistency between the relief granted in private cases and our overall national antitrust enforcement program. Why Two Enforcement Bodies? 3. The lay observer finds it difficult to under- stand why we have two antitrust enforcement arms: the Antitrust Division of the Department of Justice, and the Bureau of Competition at the Federal Trade Commission. It is even more diffi- cult to understand the rationale underlying why one case may be brought by the FTC while another, almost identical case, is brought by the Anti- trust Division. It seems to us that the Congress should examine this duplication of effort and either combine the two entities into one, or amend their respective charters so as to achieve a higher level of complementary effort. Perhaps the Anti- trust Division should be charged with structural monopoly problems, and the FTC with conduct problems. Perhaps they should be merged into a new type of entity that is answerable solely to the Congress, and which is more effective than either today. We don't know. We do believe, however, that the problem should be examined — and soon. Modernization 4. The resources of both the Antitrust Division and the Bureau of Competition must be expanded and modernized. The computer has become an essential tool in the preparation and conduct of cases by the private bar. Certainly those charged with enforcing the law need similar capabilities. A Posture of Pro-Competition 5. It would also seem appropriate to earmark a portion of these new funds for a management audit of both entities. With all due respect to the members of the legal profession, both the Anti- trust Division and the Bureau of Competition are in business — the business of reducing unjusti- fied waste in our economy and stimulating the day- to-day operation of the free enterprise system. As such, they need clearly defined goals and ob- jectives, well-conceived plans of action, and the controls required to assure maximum performance, just like any other business enterprise. Wrong Motivation 6. Lastly, the Congress might take this opportunity to ask both the Antitrust Division and the Bureau of Competition to examine in depth how we might, over time, shift from. an "anti-monopoly" posture to a "pro-competition" posture. A searching examination of our tax, labor and banking laws, regulatory policies and procedures, and numerous' other aspects of our overall economic system would undoubtedly show that we are motivating the business manager to do the very things that we then indict him for under our antitrust laws. Is it any wonder that the whole process has become an adversary one? New Legislation Is Long Overdue In conclusion, we sincerely hope that this Joint sub-Committee will report out S-1136. This legis- lation is long overdue. Similarly, we hope that the Congress will enact, and that the President will sign into law, S-1284, the Antitrust Improvements Act of 1975. Our basic antitrust laws have been on the books for more than 85 years —yet daily we see an increase in the con- centration of economic, market and political power. One has but to review the record of the hearings on Industrial Concentration held before the Antitrust and Monopoly Sub-Committee of the Senate to realize that the problem is extremely serious. We are following too closely in the footsteps of England, not to see where we are headed. The enormity of the problem is clear and the need for prompt and successful remedial action is clear. It is equally clear that Congress must act if there is to be any action at all. Steps must be taken to clarify and revise the laws and procedures that make our competitive free enterprise system function. We can no longer afford the luxury of changing Adminis- tration views or the narrow interpretation of the Sherman-Clayton Acts by our Courts if we are truly dedicated to competition within the private economic sector. Our nation has not had a positive, clearly defined goal for a long time. The forces within our society are pulling it apart — each striving to get more than the next. Isn't it time to adopt meaningful ways to get our economy and our system back on the right track? Isn't it time that more businessmen came forward to suggest them, rather than opposing any who say that the time has come to re-examine the workings of the free enterprise, competitive, capit- alist system in America? Is it not time that we had a new goal — a new vision? One where government, the private sector, and the people strive together to return to pluralism, fair dealing, honesty, and true competition on the merits. These are the in- gredients that gave America greatness. □ ■ *=* Ft T" ± s: «Eb_ H 1 Jses PART NO. •~y and PART DESC o and PART ABRV 4 and PRICE 5 and UNIT PRICE 6 and UNIT 7 and BAL ON HAND O and MINIMUM 9 a n d LEAD TIME 10 a n d USAGE TO DATE 11 and SUPPLIER All REFERENCES from FILE PART T o t a 1 n u rn b e r o f r e c o r d s i n t h i IT'"" ii B' IT"""' B**"" " fl"***** w y"— * ** Hn. I y"™*"*™ M!""l "' * ****** ** 2 j* w~%. ItL a""" ffcz- w^k, fcz.. 1 ^Ml ««-« tn. -cz* fil 1 s 12 RECAP F-^FST" 1 Uses 2 and IMiPjIMIEE PART ABRV PART NO. " 1 1, 010 •"? 1, 020 **z* 1, 030 4 1, 040 1, 050 6 1, 060 7 1, 070 8 1, 080 9 1, 090 .10 1, 1 00 11 1, 110 12 •~y t 000 -iF" A X ■=■ All REFERENCES from FILE PART NAME Total number of records in this file Ft EE. 8~ izz. F" EI a^i i - Ifcr.. -~» 12 1 •BACON" '~y ' •BREAD" •~i i 'BUTTER" 4 •CHEDDAR" 5 ' •CIDER" 6 ' ' COFFEE " 7 'CORNFLAKES 8 ' 'CORNFLOUR" 9 ' 'EGGS" 10 'MILK" 11 'ROLLS" 12 'SUGAR" 22 COMPUTERS and PEOPLE for September, 1975 RECAP LIST F" iPn R T S 1 D o e s 2 and 4 6 7 9 10 11 12 13 •and and and and and a n d a n d and and and and MOVE MOVE MOVE PLF BEGIN PARTS PLF PLF PRINT PRINT PLF FORM CONTINUE 12 X :== -Ei HDG LCVR INVENTORY VALUE •-.-" <& l"~- t» PART LINE PRINT LOOP "Total i n u e n t o r v v alue $22. 2 INVENTORY VALUE RECAP F« j"~h. B~~> T™ ■" f — ll ff~V I ••" 1 D o £* F6 T S 1 Does MOVE 13 /-. •_• t; 'z- and and and and and MOVE MOVE PLF BEGIN PARTS HDG LCVR iUI MIN ■HS-I""" 8z» PART REORDER PRINT LOOP CONTINUE RECAP P *2ii R" T : 1 D o e s 2 and 3 a n d do : REORDER PRINT LOOF" GET NEXT PART SUBTRACT MINIMUM BAL ON HAND IF DIF < PARTS REORDER PRINT LINE x s - - "Est - ""- fc> 4 and REPEAT COMPUTERS and PEOPLE for September, 1975 23 RECAP PARTS 1 D o e s 2 and 3 kl n d 4 and 5 and 6 a n d 7 and 8 a n d 9 and 1 a n d 11 an d 12 and 1 3 a n d 14 and 15 and 16 an d 17 and 1 8 a n d 1 9 a n d RECAP <3 T" O C REORDER RR I NT L_ I ME x s "••..■•" •& i-~- iz» r PRINT SPA PRINT SPA PRINT SPA PRINT SPA PRINT SPA PRINT SPA PRINT SPA PRINT SPA PRINT PLF CONTINUE $10. 10 10 10 10 10 24 PART NO. PART DESC : UNIT PRICE UNIT BAL ON HAND MINIMUM LEAD TIME USAGE TO DATE SUPPLIER CHECK 6 7 9 10 11 12 13 14 15 16 17 18 D •-• e s and and and and do and and and and and and and and and and and and and "NORMAL" PITCH "-_••" «S; |-~- tin j. MOVE DLF DISPLAY. 24 "WHAT ?" INPUT PART NO. IF PART NO. > 99,999,999,999 GET PART NO. PART NAME GET PART NO. PART OLF "no " PART NO. abr " PART ABRV desc " PART DESC stk " BAL ON HAND OUTPUT OUTPUT OUTPUT OUTPUT OUTPUT OUTPUT OUTPUT OUTPUT OLF DLF REPEAT 10 n 12 H 24 no no no no 1 , 020 a br- BACON 1, 050 abr CIDER 2, 000 abr COFFEE 1 , 040 a br CHEDDAR PART NO. PART DESCRIPTION 1,040 BARREL OF CHEDDAR CHEESE 1,050 HOGSHEAD OF APPLE CIDER 1,090 3 LB BAG CASTOR SUGAR 1,110 BAG OF CORNFLOUR 2,000 2 LB BAG, KENYAN COFFEE desc SIDE OF BACON stk 25 desc HOGSHEAD OF APPLE CIDER stk 6 desc 2 LB BAG, KENYAN COFFEE stk 9 desc BARREL OF CHEDDAR CHEESE stk 12 MIN BAL LEAD TIME USAGE YTD SUPPLIER 15 60 42 AVON FARMS 8 55 30 ORCHARD 25 15 45 REFINERY (SUGAR) 30 10 56 MILLER 10 44 25 GRINDER □ BELOW MIN PARTS LIST UNIT PRICE UNITS ON HAND $10. 000 1 12 $25. 000 1 6 $1,800 1 20 $0. 770 1 20 $3. 500 1 9 24 COMPUTERS and PEOPLE for September, 1975 The Future of Computing: Is the Sky the Limit? Frederick J. Bethke IBM General Products Division Palo Alto, Calif. 'The method of programming is not the natural method of the human mind. Predicting the Future Everyone would like to be able to foretell the future. One reason, of course, is our natural human curiosity. More importantly, a knowledge of the fu- ture can have obvious practical value. In the world of computing, those who build hard- ware and design software support need products that will sell, and knowing the coming trends is a clear advantage, if not a necessity. Customers — those who may use these products or who wish to expand the scope and effectiveness of their existing systems — also benefit from being able to plan with an aware- ness of coming trends. So it is not surprising that we have had, and continue to have, numerous predic- tions of the future world of data processing. Pro- phets step forward at frequent intervals to share the results of their crystal gazing. In the past, these predictions were almost uni- formly rosy — even grandiose. Encouraged no doubt by the truly enormous growth of computing in the late 50' s and 60' s, forecasters saw no bounds to fu- ture expansion. The words of F. Steinberg — "the potential for the computer is unlimited" — were typical. /I/ Computers would soon thrive everywhere, not only in business and industry, but throughout the "wired city."/2/ Each home would boast its own minicomputer: 2K in every cupboard. The family of the days to come would have a programmable calcula- tor, a personal filing service, and access to cen- tralized information systems. Language would be natural, everyday English — speak to your CPU and it will answer. Reservations existed only as the obverse corollary of this vision of unrestricted growth: vague fears that these powerful and omni- present machines of the future would somehow take over. Second Thoughts One still encounters predictions of unbridled op- timism;/^/ yet, soberer voices can now occasionally be heard. Those observing the realities of the ear- ly 70's know that the rates of growth have slowed, and that progress is now just as much in lateral spread as in innovative forward movement. What are the causes of this slowdown? Is it a temporary phenomenon, or will those early, super-growth days come once more? One common lament is a paucity of able programmers, With a limited number of high-quality people avail- able, a bottleneck is formed that inhibits progress, both in the development labs and in the field. Ini- tially it was thought that the problem was a lack of training. But now, with colleges giving birth to computer science majors — indeed, some students be- ing trained as early as high school — education is no longer a problem. Yet the difficulty, although ameliorated slightly, still remains. Good program- mers are in short supply. Why is this so? The Making of a Programmer An answer involves the larger question of just what goes into making a good programmer. Much time and energy have been devoted to this issue, and that the inquiry goes on demonstrates that answers remain elusive. Is programming a matter of mathematical ability, of organizational skill, of careful train- ing, of mental temperament, or of personality? Opinions vary. Some have even claimed that program- ming is an art. But placing the issue in the mys- terious realm of the aesthetic sidesteps the ques- tion; it moves the matter outside the sphere of ra- tional consideration and is really a tacit admission of nonunderstanding. It would seem that at the heart of the problem lives a disparity: the method of programming is not the natural method of the human mind. Programming is linear, sequential. It involves a clear and ex- plicit understanding of each discrete step in a procedure, and the precise ordering of those indi- vidual steps. The human mind, on the other hand, is by nature intuitive. Its calculations are often not self-conscious. It leaps multiple steps at a time, without knowing quite how. A clever but un- disciplined fellow, the brain. This means that programming does not come natural- ly to people. Programming involves learning to think in a new way — more carefully, more slowly. Try to recall those early days in programming school. For most people, the first exposure to programming, the first attempts at coding, are like trying to pitch a baseball with the opposite arm, or pat the tummy while rubbing the head. They are awkward, stiff and agonizing, unnatural. Simple exercises that one could solve in a minute mentally (perhaps with a few jottings on a scrap of paper) take hours to code. The mind is learning to think in a new way. For some people, this new way of thinking — once learned — is pleasurable. They enjoy bringing the COMPUTERS and PEOPLE for September, 1975 25 mind's processes into the open, solving a puzzle, breaking the solution into the necessary discrete steps, and locking them into hard code. But these people are rare. Most humans find the tasks of pro- gramming difficult, foreign, or just downright im- possible to perform. Double Impact This fact has a double impact on the future of computing. A limited number of potential programmers obviously puts a restriction on systems and applica- tions development. But it also constricts the final marketplace. Any product that requires its customers to do any sort of even elementary programming will necessarily not have universal or even general appeal. The populace as a whole will never become users in any sense that involves programming effort on their part. This is not to say that the amount of programming talent presently available is the absolute limit. There exists a grey area of latent potential, a seg- ment of the populace who could learn to program (or who have learned) but who find it disagreeable. Given sufficient incentive, these prople could be added to the pool of developers and users. Offered perhaps the glamour of an airline pilot, the pres- tige of a surgeon, or the remuneration of an account- ant, some additional talent could be drawn into the field. But to what extent is this practical? A second limiting factor is also at work. Suc- cessful programming necessitates not only exercise of a particular type of intelligence, but also a thorough knowledge of the application itself. With- out understanding the nature of the problem to be solved, there can be no hope of a functional program. Someone coding for an insurance company needs to know how the insurance business works. Someone writ- ing a program for a bank must understand that aspect of banking. A process control program for a foundry requires a knowledge of those particular procedures. No one can write a meaningful program without under- standing precisely what the code should accomplish, and how it can be of use to the work at hand. Thus there is a double burden on the programmer. He must have the ability and willingness to program, plus an intimate knowledge of the area in which he will work. This means that the burden on future de- velopment is intensified. It is difficult enough locating people with programming talent. When this rare skill must be found coupled with application knowledge (or willingness and ability to acquire it), we are faced with a limiting factor of significant magnitude. Generalized Programs It might be argued that these difficulties are overcome by taking top-notch, knowledgeable program- mers and having them develop generalized application programs usable in a variety of situations. Create systems that can be easily adapted (goes the theory), and users need have little programming skills: some quick modifications, a few filled-in macros, and they're on the air. Build "smart" interactive pro- grams that take the burden off the amateur user's shoulders by anticipating his confusions and mistakes. But the savings in these approaches can be illu- sory. While general-purpose programs have the value of eliminating duplicate effort, this saving is off- set to some degree by the overhead required for the build-in adaptation and customization procedures. And interactive programs for an inexperienced public ex- pand enormously when their builders try to antici- pate all the possible user errors and difficulties and combinations thereof. Programming can be defined as canned intelligence; and the intelligence has to come from somewhere. If procedures are designed so that end users need do little thinking, then a corresponding increase of effort has to be supplied by the development shop. The broader and more general and flexible an appli- cation becomes, the larger it must be, the harder it is to write, and the greater must be the under- standing and talent of the developers. The generalized approach does have some positive value in that the work is put into the hands of the most professional and capable person; one high- powered programmer can outproduce (in terms of both volume and quality) several of moderate ability, and a whole gaggle of lowly strugglers. Yet the fact remains that there are only so many A-level, double- barrelled talents available, and even these people have their practical limits. They can produce only so many lines of code each year. Limits Imposed by Complexity This factor inhibits the rate of growth, but it sets no limits on the ultimate goals that can even- tually be achieved. Yet there is another element to be considered, one which does set an absolute boundary to the future of computing. This is the factor of complexity. Some analysts have recog- nized that developments in our field are growing increasingly more complicated. /4/ They conceive of complexity as a retardant that slows the rate of development. This is certainly true, but it misses the more important point: complexity represents an absolute limit. To be useful, to be meaningful, a program has to be understood. Its creator has to compre- hend exactly what it will do in all cases. When- a program becomes so large or so complex that no single designer can wrap his mind around the whole, then there no longer is a program in any positive sense of the word. Such nonprograms can of course be built, and even made to run, but these unpredic- table code monsters will be essentially useless or even dangerous. Since they are in toto beyond com- prehension, it will be impossible to tell if their operational actions are "right" or "wrong". Large programs can be successfully built by teams, where individual members are responsible for (and only understand) their own parts. But at the head of this team there must stand one person whose intel- lect grasps the whole. If the program grows to the point where its breadth exceeds the elastic powers of this single mind, then we have entered the realm of jabberwocky. Granted that a certain level of complexity sets an absolute limit beyond which programming cannot in any meaningful sense progress, how close are we now to that point? How much larger and more intri- cate can our systems grow before even our finent programmers lose sight of the land? Certainly bugs can be found in a large number of present-day pro- grams. Can they be attributed to carelessness and haste and eliminated with better development tech- nique and control? Or is this evidence that we are already beginning to reach the outer limits, and in some cases going over the edge? This ques- tion is not to be answered here, but is one that needs answering. (please turn to page 30) 26 COMPUTERS and PEOPLE for September, 1975 Word Processing and the Computerized Office Elizabeth deAtley, Editor "Investments in Tomorrow' Stanford Research Inst. 333 Ravenswood Ave. Menlo Park, Calif. 94025 "Repetitive typing was the feature that particularly attracted the first users of the word processing typewriter, but more and more organizations are buying it because of its text-editing capabilities. " Remington and Sons, Gunsmiths The office typewriter, first introduced by E. Remington & Sons, Gunmakers, about 100 years ago, gained such rapid acceptance that by the turn of the century most of the clerks who had been copying docu- ments by hand were typing them or had been replaced by others who were doing so. Now, as we enter the last quarter of this century, the office world seems to be on the verge of a second and equivalent period of "future shock", based on the computer and spearheaded by the "word processing typewriter". The Computerized Office For a few, the computerized office is old hat. They can do things like send instant messages to re- mote colleagues by computer terminal. Or consult a library housed in a computer across the country. Or read the mail that has stacked up for them back at the office from a portable terminal in their hotel room. They use computers routinely to sort their mail, help them compose documents and look up cita- tions for them. But these people work under very special circum- stances. Many, for example, work for Department of Defense (DoD) contractors and have access to the ARPANET, which was built under the sponsorship of the Advanced Research Projects Agency (ARPA) of the DoD and interconnects computers all over the world into a single network. For the average worker, the office environment has changed little since the days when the ideal "typewriter" measured 36-26-36 and had blue eyes. On a business trip, the executive still has to phone his secretary and have her read or send his office mail to him via the U.S. mails. And the typists still type letters by hand, make corrections on the typed copy, put the letters into envelopes and drop the envelopes into the mail slot. Cost of Typing More important, since 1900, the cost of typists' labor has increased much more rapidly than has their productivity. Yet equipment that might increase this productivity has only recently begun to gain accep- tance in the traditional office environment. The typewriter, in particular, is such an integ- ral part of the way people do their work in offices that changes in its look, feel or other character- istics are resisted. Computer keyboards, for exam- ple, have not replaced or even threatened the type- writer, although they are generally quieter and at least potentially faster. But the electronic revolution is coming to the office just as it has already come to the account- ing department, the news room, the stock exchange and the airline reservation counter. In many com- mercial offices, new equipment has already changed the boss's relationship with his secretary and the way secretaries do their work. In a few years, the computer may make even more profound changes in the working habits of the boss himself. Word Processing Paving the way for this computer takeover is the so-called "word processing" typewriter. First in- troduced by IBM in 1964, this machine is much like a standard IBM Selectric typewriter. It has two added capabilities, however, that greatly increase the typist's potential productivity — but at the cost of changing her procedures and those of the executives she serves. These capabilities, for which the user pays any- where from $5,000 to $15,000 more than for a stan- dard Selectric, are memory — usually in the form of magnetic cards or tape — and logic circuitry. Together these capabilities allow the machine to translate the typist's keystrokes into machine- readable form, record this material in memory and manipulate it in various ways to yield new text, such as corrected pages. Magnetic Recording The keyboard is standard, but typing on it pro- duces not only a paper copy but also a magnetic re- cording that can be automatically searched and se- lectively edited. When all the changes have been made on the magnetic recording, the typist feeds it Based on "Typewriter with a Memory Paves Way for Computerized Office" in Investments in Tomorrow, Winter 1975, Issue no. 14, published by Stanford Research Institute. COMPUTERS and PEOPLE for September, 1975 27 through the typewriter, producing a clean paper copy at full speed for the typewriter. This not only saves the time required for manual retyping — which may have to be done several times during the course of preparing a long document — but also eliminates the risk of introducing new errors in unchanged text during retyping. Final Review It also minimizes the chances that a document will fail to pass the final review step. Tom Humphrey, a senior research engineer who has conducted extensive studies of large document-processing systems, includ- ing SRI's, estimates that in a typical manual system, up to 25 percent of the documents reviewed after fi- nal typing are returned to some earlier stage of pro- duction, often at greatly added cost. Apparently either the originator gets cold feet when he sees the document for the first time as intended recipients will see it, or else the entire process has taken so long that new information has become available. With the automatic retyping capability, the per- centage of rejects at the final production stage is cut down to 10 to 15 percent, Humphrey says. Such a system allows the originator to see the document in closer to final form earlier in the process and to work with clean copy at every step of the opera- tion. It also shortens the production cycle so that new information is less likely to become available before the document is completed. Boiler Plate Another advantage of the word processor is that it facilitates the formation of a central library for standard passages or "boiler plate" that can be reused many times. Once such boiler plate has been recorded on magnetic cards or tape, it can easily be added to the library. When a text originator needs a similar passage, he merely dictates the standard passage number and the desired changes. The typist then locates the tape or card containing the passage and feeds it through her word processing typewriter, keyboarding only the changes. Alan Purchase, a senior industrial economist who has just completed a two-year multiclient study of office equipment, says that repetitive typing was the feature that particularly attracted the first users of the word processing typewriter — largely such firms as insurance companies and law offices that make heavy use of boiler plate. But more and more, organizations are buying the machine because of its text-editing capabilities. He points out that two word processors, effectively used, can do the work of three or more standard typewriters. According to to Humphrey, users who replace standard electric typewriters with word processors report typical sav- ings of $1 to $2 per final printed page. The word processor is expensive, however, and to achieve these savings, office procedures have to be changed so that the equipment can be fully utilized. As a result, most users have formed special word processing groups to handle the work of several ori- ginators. Because of their greater productivity, the secretaries specialize either as full-time typists or as administrative support personnel. The origi- nators deal with each secretary according to her specialty, often dictating to a machine. A typical procedure is to dictate by telephone directly to dictation equipment in the word processing center. Disappearance of the Private Secretary Although the originators may miss the convenience and prestige of having a private secretary, this arrangement offers some attractive compensations for them as well as for the secretaries. The origina- tors can dictate whenever they wish, obtaining a second, third or fourth clean draft without fear of antagonizing the typist. And the secretaries have greater choice as to the type of work they do, as well as more opportunities for advancement. Instead of rising or falling with one executive on the cor- porate ladder as private secretaries do, they can choose among various career paths. Those who prefer to be full-time typists do not also have to answer the telephone or make coffee. Because of the complexity of their equipment, they compete against their peers on the basis of technical proficiency, like the keyboarders (largely male) in the printing and publishing industry. The administrative support personnel can choose to specialize in reception, research, scheduling and a variety of other activities that can lead into lower management positions and on up the ladder. Market for Word Processors The market for word processors is growing rapidly. According to Purchase, there were 200,000 such ma- chines in use in the U.S. at the end of 1974, and he expects the number to double in 2 to 3 years. By 1980, he estimates, 10 to 15 percent of the type- writers used in business will be word processors. A number of companies have entered the word pro- cessing market recently. In addition to IBM, there are more than a dozen other word processing type- writer manufacturers, including Xerox, which intro- duced its initial product in October 1974. And other office machines, such as copiers, dictation equipment and communication systems (including the telephone), are all being changed to make them a part of this market. In the next two to three years, Humphrey says he expects this activity to lead to major changes in both equipment design and office procedures. He points out that the recent drop in the cost of elec- tronic components makes it reasonable to think of replacing the word processing typewriter with an assembly of electronic components (keyboards, print- ers, and electronic display screens), tied together by a microprocessor or minicomputer. Such an assem- bly is potentially more productive than the word processing typewriter, he notes, because the various functions of keyboarding, printing and display can be going on at the same time. With a typewriter, the keyboard, for example, is idle while automatic typing is in progress. To justify the cost of such an assembly today, Humphrey estimates that the work load would have to be large enough for 4 to 8 word processing typewrit- ten. But he notes that the cost of electronic components is dropping relative to that of the word processing typewriter. By 1978, he believes, an as- sembly of such components will be fully cost compe- titive on a one to one basis with the word proces- sing typewriter. The Word Processing Department of Tomorrow There are of course many possible views of to- morrow's office. Humphrey's is as follows: He 28 COMPUTERS and PEOPLE for September, 1975 visualizes a word processing department in which each typist's desk would have a small, attractively de- signed keyboard with an electronic screen capable of displaying the last few lines of text. The typists would not have to hit the carriage re- turn at the end of each line. Instead the machine would break the lines automatically. And there would be no paper to change. To make minor corrections as they typed, the typists would refer to the small dis- play. For more extensive text-editing after keyboard- ing, they could view a page at a time on a TV-type screen shared with one or more of their associates. To make a correction, the typist would merely point (with an electronic pointer) to the desired spot on the screen, type in the new words, and the corrected page would appear immediately on the screen. For producing final copy after the corrections had been made, several typists might share a high-speed but relatively quiet printer, a phototypesetter or even an office copier. Humphrey estimates that his system could improve productivity as much as 20 to 30 percent over a word processing typewriter. A major factor in this saving would be the increase in the typist's speed resulting from the elimination of paper. The carriage return, changing of paper and the noise of mechanical printing all tend to slow the typist down. Increased Speed of Editing Another factor that would contribute to this po- tential savings is the greater ease and speed of editing. Experiments have shown that a skilled opera- tor can edit a document 1% to 3 times faster on a good electronic display than on a word processing typewriter. Clearly a cluster of word processing keyboards, display screens, memory and print mechanisms could be interconnected by telecommunications so that the units could be separated by long distances. This would allow mail to be sent by telephone lines from one company to another, just as data is sent today. Instead of preparing a final copy of a letter or document and stuffing it in the mail, the secretary would feed the magnetic recording into a device that would convert the information into a form that could be transmitted over the telephone lines. When it had arrived at the desired destination, the informa- tion would be printed out in hard copy or viewed on a screen. IRS Experiment The Internal Revenue Service is experimenting with such a system to prepare and transmit briefs in tax cases from local IRS offices to Washington, D.C. , where a word processing typewriter at the IRS head- quarters types up a final document for review and filing. This telecommunications capability makes it eco- nomically feasible to add to the system large but physically remote computers that are capable of more complex specialized functions such as phototypesetting, storage of boiler plate or longer text-editing jobs — such as the updating of mailing lists. Service bureaus specializing in such services have already sprung up in a few of the larger metropolitan areas. Their typical customer has one or more word processing typewriters inhouse that he used as stand- alone devices to prepare routine correspondence and short documents and connects by telephone lines to the service bureau computer for more complex opera- tions. Purchase expects this trend to grow rapidly. By the 1980* s he believes enough communications type- writers will be in use to have an important impact on business correspondence. Decrease of Costs of Data Communications Largely responsible for this growth, he believes, will be cheaper and faster hardware and lower data communications costs. As postal rates go up, he says, high-volume data communications rates will be- come increasingly attractive. He explains it this way: Until recently, the rates set by the Federal Communications Commission (FCC) and the Bell System were based on service usage. Thus a rural or resi- dential user who used the telephone only occasion- ally paid much less in relation to the actual cost of the service than did a heavy business user in a metropolitan area. But when the FCC permitted spe- cialized common carriers, such as MCI, Datran and Southern Pacific to compete with the Bell System in high-use metropolitan corridors, the basis for the rates began to shift from use to actual cost of the service. Purchase sees a continuation of this trend, with the result that businesses will pay proportion- ately less for service while rural and residential users will pay more. Interface Software Another factor that will encourage more extensive communications with remote computers is the develop- ment of software to facilitate the interaction be- tween different computer systems. Normally two sys- tems, such as a large computer and a small one, or two different programs even in the same computer, have different data structures and formats and use different computer languages. Thus if a system designer, for example, wants to go from one time- sharing program to another to help him design a par- ticular system — like a carpenter going from one tool to another in the course of building a chair — he may have to use different computer languages with each program. SRI has been one of the principal pioneers in developing the standards, data formatting and trans- lation systems needed to eliminate this Tower of Babel. For 12 years, Douglas Engelbart, Director of SRI's Augmentation Research Center, and his col- leagues have been developing a computerized "work- shop" to augment the capabilities of professional workers. Having developed a prototype coordinated workshop suitable for individuals and project teams, the re- searchers extended it to include a network-coupled distributed community when the ARPANET became avail- able. ARPANET users who have access to these tools can interact freely with computer installations anywhere on the net, provided they have made contractual ar- rangements with the host organizations. Thus they can easily move from one remote computer program to another in the course of carrying out their work assignments. Spinoffs This ease of interaction with remote computers may soon be available to business users generally. COMPUTERS and PEOPLE for September, 1975 29 Recently two commercial spinoffs of the ARPANET — Telenet, a subsidiary of Bolt, Beranek and Newman, and Packet Communications, Inc. (PCI) — obtained FCC approval to build public networks similar to the ARPA- NET that will allow different types of computer sys- tems located wide distances apart to send and receive messages from each other. Telenet has completed its first switching center in Washington, D.C. , and, according to Stuart Mathi- son, Vice President of Planning, the company expects to have similar centers in 7 major cities by mid- 1975. Present plans call for 18 centers by early 1976, he says. PCI hopes to have service in 18 cities by late 1975 or early 1976, according to its president, Lee Talbert. Packet Switching Both companies propose to use "packet switching", a technology pioneered on the ARPANET. In this form of communication, messages are cut into pieces or "packets" of a given length. Each packet is then switched independently from one node of the network to the next along the best available route by means of switching computers at each node. When all the pieces arrive at their destination, a computer there reassembles the message and delivers it to the appro- priate computer installation or terminal,. This switching technology is apparantly low enough in cost to make a distance-independent rate structure economically feasible. Both Telenet and PCI have proposed to charge only by the length of the message and not by the distance it is sent. The repercussions of this type of service and rate structure on the business world are likely to be pro- found. □ Macdonald — Continued from page 17 Table 4 of course is the same as Table 3 except that each pair of digits is listed in the reverse order. Table 5 contains so many solutions (44 in all) that often it will not be useful. So let us subdi- vide it, by considering what happens when the result of multiplying A by B (which is C) is multiplied once more by A; this information often appears in problems. For example, consider the multiplication: * B C x * * * * * C Here A times B ends in C, and A times C ends in a digit x. There are four cases: x equal to A, x equal to B, x equal to C, and x equal to D. The tables of the solutions follow. Again they enable the possible cases to be narrowed down rapidly and traced through easily. In symbols "A times B ends in C" may be expressed as "A-B = C". Bethke — Continued from page 26 Summary In summary, what can we conjecture about the fu- ture in our field? In what directions is it most reasonable to focus our efforts? First, it does not seem very fruitful to expect any immediate pie-in-the-sky. Progress will be hard- won and incremental, rather than immediate and spec- tacular. The limiting factors of complexity and a finite talent pool will tend to channel movement laterally into known areas rather than into great leaps forward. Emphasis will probably be on intel- ligentt prepackaged interactive systems for the public — not because such systems are quick and easy to build, but because they represent the line of least resistance. The recent success of such systems as the super- market checkers suggests that that type of machine and program combination might become a significant avenue of exploration: innovative hardware that re- moves some of the physical burdens from man, coupled with traditional, limited-scale programming. A final caveat, however: these and any other fore- casts should not be accepted unreservedly. The safest prediction is that man will continue to be that in- genious creature whose inventiveness keeps turning predictions upside down — in the world of computers as in the world at large. References 1. "First Book of Computers", (Watts, 1969). 2. See, for example: R. Rusch, "Man's Marvellous Computer: the Next Quarter Century", (Simon 6- Schuster, 1971); C. Winston, "New Horizons for Communications", "Journal of Data Management", June, 1969; F. Seitz, foreword to "Purposive Systems", ed. H. Von Foerster (Spartan, 1969); and J. Martin and A. Norman, "The Computerized Society", (Prentice-Hall, 1971). 3. As examples: V. Farmer, "A Look toward 1985", "Computerworld", Feb. 27, 1974; J. Campise,' "Data Processing: 1973: 10 Years", "Data Manage- ment", May, 1973; AFIPS 1973 National Confer- ence, Session on Views of the Future. 4. E.G. Glaser, "The Myth Is Dead — Long Live the Myth", AFIPS 1972 National Conference (Fall), pt. 2. D Table 6 Table 7 Table 8 Table 9 A-B=C and A-B=C and A-B=C and A-B = C and A-C=A A-C=B A'C = C A-C=D ABC ABC ABC A B C D 2 3 6 4 2 8 2 5 2 4 8 6 2 8 6 4 8 2 4 5 2 7 4 8 3 7 1 9 2 8 5 2 2 9 8 6 4 9 6 9 3 7 5 4 3 2 6 8 7 3 1 9 4 6 5 6 3 4 2 6 8 2 6 9 6 4 5 8 3 6 8 4 8 7 6 9 7 3 6 3 8 3 8 4 2 9 8 2 6 5 3 9 7 1 6 7 2 4 3 2 8 6 9 4 4 7 8 2 8 5 7 2 4 8 7 4 8 6 7 6 2 4 7 8 6 2 7 9 3 1 8 3 4 2 8 4 2 6 8 9 2 6 □ 30 COMPUTERS and PEOPLE for September, 1975 Announcing plans for a new quarterly magazine: COMPUTER GRAPHICS AND ART To all persons interested in: Applied Arts and Graphics Architectural Graphics Cartography Systems Computer Aided Design Computer Assisted Instruction in Computer Graphics Computer Graphics in Physics, Chemistry, Mathematics, and Other Sciences Computer Graphics in Literature, Semantics, Fine Arts, Applied Arts, and Other Fields Computer Graphics in Business, Industry, and Other Branches of Knowledge Interactive Graphics Languages Courses in Computer Graphics Dear Colleague, At the present time we are exploring the possibi- lity of publishing a new magazine on interdisciplin- ary computer graphics and computer art aimed at the college level. We need your feedback concerning the graphic interests that you have and that you know of. We want this magazine to be useful to you and your colleagues. Accordingly, this is your invitation to submit material and to begin subscribing (or indicate your intention of subscribing) to COMPUTER GRAPHICS AND ART a new quarterly to be published starting probably in January 1976, and for which I have been asked to be the editor. At the present time an advisory board of distin- guished people and a group of contributing editors well known in graphic fields are being assembled. Your suggestions and nominations will be welcome. You and your colleagues are cordially invited to submit papers, articles, computer graphics, photo- graphs, reviews, computer art, ideas, etc. — no holds barred — for us to consider for publication. In addition, your suggestions about authors whom you would like to have papers from will be most welcome. One of our goals is to publish materials on computer graphics early; and then authors can more quickly establish their professional claims for origination of good ideas and programs. Every author receives permission to reprint his or her material unlimited- ly, although the magazine is copyrighted by the pub- lisher. We look on subscribers as colleagues in a mutual effort, and not as listeners in a lecture room. Your help and cooperation in this mutual under- taking is warmly invited and will be most appreciated. May we hear from you? Cordially, -to^ ;o3 Grace C. Hertlein Editor, "Computer Graphics and Art" Associate Professor Department of Computer Science California State University, Chieo Chico, Calif. 95926 COMPUTERS and PEOPLE for September, 1975 Here is your chance for feedback to us: - - - -(may be copied on any piece of paper)- - - - TO: COMPUTER GRAPHICS AND ART Berkeley Enterprises, Inc., Chico Branch 555 Vallombrosa, # 35 Chico, Calif. 95926 ( ) 1. Yes, please enter my annual subscription to the quarterly COMPUTER GRAPHICS AND ART: ( ) personal, $10; ( ) library, $15 ( ) department, ■ $15 and bill me. ' ) 2. Yes, please record my intention to subscribe annually: ( ) personal, $10; ( ) library, $15 ( ) department, , $15 and notify me when plans are firm. ( ) 3. I hope to submit for consideration for pub- lication, material on the following topics: ^A_ ( ) 4. I would be particularly interested in cove- rage of the following subjects: *A_ ( ) 5. I am interested in reading materials, by the following authors: ^A_ ( ) 6. Please send me further information on bonuses for subscribing: ( ) Computer Art Reprints ( ) FORTRAN IV programs for computer art ( ) Computer Graphics Bibliography ( ) 7. I suggest you send information to my friends and associates whose names and addresses follow: *A 8. Any Remarks or Comments?_ *A Name Title Organization Address *A - attach paper if needed 31 Computing and Data Processing Newsletter WAREHOUSE OPERATION IN LIMESTONE CAVES USES COMPUTER Donald B. Allen Manager, Public Relations General Automation, Inc. 1055 South East St. Anaheim, Calif. 92805 If Stone Age man were to return to central North America today* he might find it difficult to com- prehend that someone actually has computerized some caves in Randolph Quarry, Clay County, Mo. near Kansas City, Mo. He could probably understand why, however. Just as he used the caves in this area 50,000 years ago as shelter for his family and food supply, so Space Center Kansas City, Inc. now uses these limestone caves for major warehouse space and for a distribution center for many of this country's largest food processors. The computer simply makes the job easier. Geologists estimate the rock ledges in the area to be more than 560 million years old. The natural caves located 80 or more feet underground have been enlarged by man in the last 30 years via limestone mining operations that add another 100,000 square feet of warehouse space each year. Space Center, Inc., is based in St. Paul, Minn, but their cave warehouse in Missouri has 1.2 million square feet of net usable storage space, including six acres of freezer space. The primary service of- fered in these caves is the storage of foodstuffs, since year-round temperatures range from 65-70 degrees and humidity can be maintained easily at 45-50 per- cent. The volume of business handled is large, both because of the ideal storage conditions and because the warehouse is located near the geographic center of the United States — an important factor when considering the distribution of food. « Space Center Kansas City serves more than 20 major customers including General Mills, Hunt-Wesson Foods, CPC International, Proctor & Gamble, Pillsbury, Gen- eral Foods, Ralston-Purina, and others. A tour of the caverns here reveals an impressive multi-million pound supply of cereals, sugar, gelatine desserts, tomato sauce, powdered fruit drinks, pet foods, fro- zen TV dinners, catsup, and numerous other common food products that eventually find their way to din- ner tables everywhere. The average weekly in/out volume is around 15 million pounds, which is handled in 300 trucks and 150 railroad freight cars per week. This implies a mountain of paperwork in the form of invoices, re- Underground Storage ceipts, bills of lading, customer account records and inventory control records. The size of the paperwork load is the reason why the warehouse has installed an automated warehouse system from General Automation, Inc. The computer system consists of an 18/30 central processor with 8K words of core memory, three 512K word disk drives, a 300-line-per-minute printer, one console and one remote teletypewriter and a GE Terminet T300 for forms output. The configuration is sized specifi- cally to the warehouse's needs, based on the number of customers for whom they store, the number of dif- ferent items stored for each customer, the number of transactions for each, and other data. System software is all Macro Assembler. Applica- tion programs are basically text-editing and file- management routines that provide a data base custom- designed for public warehousing. It includes a fully buffered, multi-terminal operating system. The speed with which the processor completes each task is usually one to two seconds and the user at the terminal never notices any delay. The entire system was installed in late 1974. The redundant manual system was discontinued before the end of the year. Clerical time has been cut by at least 25 percent. As each customer shipment arrives at the cave warehouse, all information on it is entered into the 32 COMPUTERS and PEOPLE for September, 197G computer via a combination bill of lading and ware- house receipt input form, typed in by one of the clerk/secretaries. This includes: customer identifi- cation number; the date of the receipt; customer name and address; the route to be used for shipment; freight bill number; rail car or truck identification and seal number; customer reference number; and, fi- nally, all data on the warehouse item and lot num- bers, quantities and shipment weights. This information forms the data base from which all succeeding transactions are handled by the com- puter. The inventory is tracked automatically and updated as new shipments arrive or as product is distributed. Some customers* goods are in and out as many as nine times a year, while others store goods for several months before distribution. This varies by commodity and customer. As each customer requests shipment of his product, the computer handles the printing of shipping docu- ments and invoices automatically upon entry of the order to ship. There's no shortage of shipping orders. 100,000 cases of cereal or 250,000 cases of gelatine dessert don't last very long. INFORMATION RECYCLING Information International, Inc. 5933 Slauson Ave. Culver City, Calif. 90230 Information recycling is a critical segment of man's knowledge. It is the application of computers and electro-optical technologies to improve man's control over information. Information is kept on paper, film, or magnetic media. Frequently the form is suitable only for communication between machines. Much information exists in forms that computers cannot so far work with — printed books or hand-printed records, for instance. Most information is perishable — some is subject to almost constant change, like directories or catalogs. Keeping it current by previous manual techniques represents at best drudgery, at worst an impossibility. Some information is so complex that it can only be automatically processed — satellite- collected details of the earth, or seismic oil ex- ploration data. In short, information exists in many forms, and there are a wide variety of ways in which it can be used. It is plain and clear that out-of-date or inaccu- rate information can be an annoyance to an individual or a disaster to a business firm. Most people recog- nize the dependence of business and of government on swift, accurate information — presented in formats that people can effectively use. That is the essence of our business: Information Recycling. For more than a decade, this company has developed concepts and technologies for: capture; update; and publication. Through the continuing process of information re- cycling, man's knowledge is ever expanding. Yester- day's data needs to be updated for today's users and again for tomorrow's. In the process, new visual information may be captured and combined with data already in computer form, to publish updated informa- tion. Capture Capture is the first of the three phases in infor- mation recycling; it is the step required to put in- formation into a state which permits computer updat- ing and publishing. It can be accomplished manual- ly — or automatically. Automated capture is the process of converting information from a visual form into a state the com- puter can process. Our systems scan source information under compu- ter control using character recognition techniques to capture text, or pattern analysis to capture pic- torial information. A large Japanese corporation uses our Programmable Film Reader to scan X-rays for early detection of ulcers and cancer. Thus medical information which would otherwise be subject to limited analysis by the available specialists using manual methods is captures in a form which multiplies the effectiveness of their skills. The most powerful Information International cap- ture system is GRAFIX I. The system is initially applied to the automated capture of text, a process generally referred to as Optical Character Recogni- tion (OCR). GRAFIX I is distinguished principally for its ability to read information which was not originally prepared for automated capture. Thus large bodies of published information become avail- able for economic information recycling. Up to now published works could not be easily republished if they needed correction or update. After such information is placed in computer form its update and republication is practical. GRAFIX I offers that prospect for legal records, govern- ment documents, scientific data and records of busi- ness transactions. Update Update is the editing, changing or merging of old information with new data. An engineer at his drafting table or an editor with pencil represent two conventional methods of updating. Neither is fast or economical in relation to the demands of modern society. In our systems, editing is done from the screen of a television-like tube. Changes are made elec- tronically. Errors are corrected in the same way. One of the world's most sophisticated systems is incorporated in a system installed at a Navy facili- ty in Florida. Here after capturing each of the over 17,000 technical manuals, the system provides the technical editor with less than ten seconds ac- cess to any individual page. Additions and deletions are entered by the editor through the keyboard with verification on the CRT display. Full recomposition of the revised manual is provided including the auto- matic generation of all indexes, tables, tables of contents, and lists of tables and figures. Publication Publication is the process which gives the com- puter-stored information a new recorded form. It may be books, manuals, directories or movies. It may be all of these, separately or all together. Our systems enable the same information to be pub- lished in many forms — microfilm, microform, movie, printing press plate or hard copy — for viewing, printing or reading as user needs dictate. COMPUTERS and PEOPLE for September, 1975 33 A telephone book can be printed in the familiar form for use by the phone customer. And, it may re- main on computer tape for the billing department. It may be published on microfilm for the service de- partment's use. At Northwestern Bell, our equipment is used to typeset a new phone book every other work- ing day. Republishing is not limited to directories and critical technical information. There can be econo- mies in automatically republishing uncomplicated in- formation that we rely on daily. In Britain, one of our systems was purchased to produce stationery for the National Westminster Bank. At the Bank, which has 3,300 branches, two to three thousand different pieces of stationery are personalized and printed each week — letterhead, envelopes, overdrawn notices, checks. Use of this system will permit branches to order for current needs instead of ordering a six- months' supply and carrying large inventories of preprinted items. And the information, when it changes, will be ready for automatic, inexpensive recycling — again and again. AEROFLOT TO USE GENERAL AUTOMATION MINI- COMPUTERS IN SOVIET MESSAGE SWITCHING NETWORK John A. Dillon General Automation. Inc. 1055 South East St. Anaheim, Calif. 92805 Aeroflot, the Russian national carrier, has shown a spectacular increase in traffic, from 72 million passengers in 1970 to more than 90 millions in 1974. And the prospect for continued increase in demand on a great scale is good. Such growth has posed numerous problems, includ- ing communications between various regional centers. So, a comprehensive $7.5 million computer-based net- work is to be installed by the Compagnie Generale de Construction Telephonique (C.G.C.T.) of Paris, France. The network will be based on 23 C.G.C.T. DS6-400 hardware/software modules which are built around SPC-16/85 minicomputers from General Automation, Inc. These modules handle the tasks commonly asso- ciated with message switching, and real-time file interrogation and data base management. In addition to standard GA operating software, the system will include a complete network control package and a new high level language, ESPL-1, developed by C.G.C.T. The network will include five major switching cen- ters in Moscow, Rostov, Novosibirsk, Alma-Ata, and Sverdlovsk. These centers will handle some 4 mil- lion messages, or about 1 billion characters, per day. Each processing module will handle a minimum of eight messages per second. This is the second minicomputer based network installed by C.G.C.T. in the Soviet Union. The first, valued at about $1.5 million, was purchased by the Soviet Merchant Navy MORFLOT for a country- wide communications system. Several other Russian governmental agencies are negotiating similar equip- ment purchases. MULTISPECTRAL IMAGE ANALYSIS SYSTEM EXTRACTS OIL DATA, CROP DATA, ETC., FROM SATELLITE PICTURES Margaret McCarvill News Bureau General Electric 1010 Barclay Bldg. Bala Cynwyd, Pa. 19004 A new ground system that helps estimate food crops or locate potential oil deposits in images received from the LANDSAT earth resources satellite has been announced. Called the IMAGE 100 Multispectral Image Analysis System, it consists primarily of an Image Analysis Console with a color television monitor, linked to a mini-computer. Image 100 allows a geologist, ag- riculturalist, or other specialist to process the satellite images while they are displayed on the TV monitor, and to determine his results immediately. Images from the satellite's multispectral sensor are stored on either film or digital tape and then transferred to IMAGE 100. Seated in front of the console, the scientist or specialist controls all the functions of the system, and operating it himself, can selectively process data. In a matter of minutes, crops, geologic features, land use patterns, and other characteristics can be identified and classi- fied throughout the scene. The system gets more information from the LANDSAT data and gets it more rapidly than any existing prior technique. The system extends the specialist's abil- ity to interpret the image and allows him to extract the maximum amount of information from the spectral data collected by the satellite sensor. In addi- tion, the images can be analyzed in a fraction of the cost of other methods. A number of clients including oil companies, ag- ribusiness firms, federal and state agencies, and universities are using the IMAGE 100 system at the GE Space Division's Image Processing and Analysis Center in Boltsville, Md. The system has been used for large scale agricultural inventories, oil and mineral exploration, strip mine monitoring, water pollution studies, and measurement of urban growth in cities and suburbs. Captain Jacques Cousteau visited General Electric's IMAGE 100 facility in Beltsville, Maryland recently, as a guest of NASA and the General Electric Company. The purpose of Cousteau's visit was to review the results of a real time experiment using LANDSAT data that was completed in November 1974. 34 COMPUTERS and PEOPLE for September, 1975 GAMES AND PUZZLES for Nimble Minds - and Computers Neil Macdonald Assistant Editor It is fun to use one's mind, and it is fun to use the artificial mind of a computer. We publish here a variety of puzzles and problems, related in one way or another to computer game playing and computer puzzle solving, or to the programming of a computer to understand and use free and unconstrained natural language. We hope these puzzles will entertain and challenge the readers of Computers and People. NAYMANDIJ In this kind of puzzle an array of random or pseudoran- dom digits ("produced by Nature") has been subjected to a "definite systematic operation" ("chosen by Nature") and the problem ("which Man is faced with") is to figure out what was Nature's operation. A "definite systematic operation" meets the following requirements: the operation must be performed on all the digits of a definite class which can be designated; the result displays some kind of evident, systematic, rational order and completely removes some kind of randomness; the operation must be expressible in not more than four English words. (But Man can use more words to express it and still win.) NUMBLES A "numble" is an arithmetical problem in which: digits have been replaced by capital letters; and there are two messages, one which can be read right away and a second one in the digit cipher. The problem is to solve for the digits. Each capital letter in the arithmetical problem stands for just one digit to 9. A digit may be repre- sented by more than one letter. The second message, which is expressed in numerical digits, is to be translated (using the same key) into letters so that it may be read; but the spelling uses puns, or deliberate (but evident) mis- spellings, or is otherwise irregular, to discourage cryptana- lytic methods of deciphering. NAYMANDIJ 759 NUMBLE 759 7 6 1 1 3 5 8 9 1 8 2 1 7 3 8 5 7 7 2 5 4 5 3 5 2 4 8 2 5 4 5 3 4 3 4 3 5 3 2 2 6 6 9 6 1 8 1 5 9 5 3 4 4 3 6 8 9 5 2 8 8 3 2 2 6 7 5 4 2 5 2 8 8 1 7 8 3 5 9 1 8 8 1 7 5 2 2 5 4 7 9 2 4 5 5 5 8 4 3 2 3 1 1 9 9 5 1 9 8 8 4 2 8 2 2 5 8 2 9 2 2 5 5 7 9 8 7 2 4 6 7 9 8 2 3 6 9 4 7 6 5 7 5 5 8 5 5 6 3 8 4 3 1 1 4 4 9 9 BEY = RFW KNOW x THEE K R N T T K B N T T N T K K S O K W W = s N H E L K T — s K L W N N S THYSELF 63710 95895 77676 3951 MAXIMDIJ In this kind of puzzle, a maxim (common saying, proverb, some good advice, etc.) using 14 or fewer different letters is enciphered (using a simple substitution cipher) into the 10 decimal digits or equivalent signs for them. To compress any extra letters into the 10 digits, the encipherer may use puns, minor misspellings, equivalents like CS or KS for X or vice versa, etc. But the spaces between words are kept. MAXIMDIJ 759 v x x n x * © ■ ne v & ■