{"title":"Beyond the data processing horizon","authors":"C. Hammer","doi":"10.1145/800171.809657","DOIUrl":null,"url":null,"abstract":"The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs.\n These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1985-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs.
These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.