The results of an empirical study of 202 business data processing subjects from twelve computer centers in metropolitan Atlanta are reported. Perceptions of organizational practices were measured and then subjected to factor analysis and reliability criteria. Ten factors were used in the data analysis. Management Ability to Make Decisions and Select Personnel emerged as the most significant single factor. People oriented factors appeared to offer the greatest potential payoffs. Implications for data processing management are discussed.
{"title":"An assessment of organizational practices in data processing environments","authors":"Charles K. Woodruff","doi":"10.1145/503506.503526","DOIUrl":"https://doi.org/10.1145/503506.503526","url":null,"abstract":"The results of an empirical study of 202 business data processing subjects from twelve computer centers in metropolitan Atlanta are reported. Perceptions of organizational practices were measured and then subjected to factor analysis and reliability criteria. Ten factors were used in the data analysis. Management Ability to Make Decisions and Select Personnel emerged as the most significant single factor. People oriented factors appeared to offer the greatest potential payoffs. Implications for data processing management are discussed.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1980-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122621514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The need for computer security has grown every year since the creation of computer systems, but yet with such a high demand, there are many systems that are, by no means, adecuetly protected.This paper will discuss the three classes of vulnerabilities of security. The three classes are: those that threaten the physical integrity of the computer installation and its data, those that threaten the loss or compromise of the data from outside the computersite, and those that threaten loss or compromise of data from inside the computer site.The chief physical risk to a computer site is fire, acts of sabotage, industrial accidents, natural disasters, and mechanical or electrial malfunction of the computer system. Outside threats are those people who do not work for a particular firm, but yet wish to gain information about it that is not readily accessible to them. Inside threats come from employees who wish to compromise the computer system weither for gain, accident, or past time. Each one of these topics will be dealt withThe next part of the paper deals with the subject of setting up a security program. The first step in this subject is the study to access the probability of an event occuring, and determining it as either fatal to the business, very serious, moderately serious, relatively unimportant, or seriousness unknown. Some of the security techniques of checks and tests on the system are then discused.
{"title":"Data security","authors":"D. Hanson","doi":"10.1145/503506.503543","DOIUrl":"https://doi.org/10.1145/503506.503543","url":null,"abstract":"The need for computer security has grown every year since the creation of computer systems, but yet with such a high demand, there are many systems that are, by no means, adecuetly protected.This paper will discuss the three classes of vulnerabilities of security. The three classes are: those that threaten the physical integrity of the computer installation and its data, those that threaten the loss or compromise of the data from outside the computersite, and those that threaten loss or compromise of data from inside the computer site.The chief physical risk to a computer site is fire, acts of sabotage, industrial accidents, natural disasters, and mechanical or electrial malfunction of the computer system. Outside threats are those people who do not work for a particular firm, but yet wish to gain information about it that is not readily accessible to them. Inside threats come from employees who wish to compromise the computer system weither for gain, accident, or past time. Each one of these topics will be dealt withThe next part of the paper deals with the subject of setting up a security program. The first step in this subject is the study to access the probability of an event occuring, and determining it as either fatal to the business, very serious, moderately serious, relatively unimportant, or seriousness unknown. Some of the security techniques of checks and tests on the system are then discused.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"401 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124278006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Almost all of the recent research in the field of electronic composition and generation of music relies on the use of large computers. This work describes the design and development of a system to compose and generate music using a microcomputer together with a music synthesizer.The scope of this project included building a modular synthesizer with a wide range of modules, designing and building an inexpensive microcomputer suited to the task of music generation, and designing and building interfaces that would link synthesizer modules under computer control and provide digital control of the synthesizer parameters and the frequency and harmonics of the sound. The resulting system was capable of real-time music composition and generation, as well as having control of every parameter of the sound including the Fourier Series of each note, envelope shape, filter timbre and Q, reverb, distortion, etc. This complete system was built for under $2000, which is less than the cost of twenty hours of time on most large computer installations.
{"title":"The design and construction of a computer controlled music synthesis system","authors":"M. Montgomery","doi":"10.1145/503506.503548","DOIUrl":"https://doi.org/10.1145/503506.503548","url":null,"abstract":"Almost all of the recent research in the field of electronic composition and generation of music relies on the use of large computers. This work describes the design and development of a system to compose and generate music using a microcomputer together with a music synthesizer.The scope of this project included building a modular synthesizer with a wide range of modules, designing and building an inexpensive microcomputer suited to the task of music generation, and designing and building interfaces that would link synthesizer modules under computer control and provide digital control of the synthesizer parameters and the frequency and harmonics of the sound. The resulting system was capable of real-time music composition and generation, as well as having control of every parameter of the sound including the Fourier Series of each note, envelope shape, filter timbre and Q, reverb, distortion, etc. This complete system was built for under $2000, which is less than the cost of twenty hours of time on most large computer installations.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125913687","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
But these PLATO systems, while making some provisions for communication between the central computer and terminal, provide no efficient means for fast communication. Intelligent terminals are now coming into use on the FSU PLATO system. This paper describes modifications made to the FSU PLATO system to allow communication between the intelligent terminals and the central computer at the highest speed permissable by the hardware.
{"title":"Data communications for intelligent PLATO terminals","authors":"P. Jensen","doi":"10.1145/503506.503545","DOIUrl":"https://doi.org/10.1145/503506.503545","url":null,"abstract":"But these PLATO systems, while making some provisions for communication between the central computer and terminal, provide no efficient means for fast communication. Intelligent terminals are now coming into use on the FSU PLATO system. This paper describes modifications made to the FSU PLATO system to allow communication between the intelligent terminals and the central computer at the highest speed permissable by the hardware.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122576623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microprocessor applications fall into two classes: general purpose computer systems as are found in home and hobby computers, and special applications where the microprocessor is dedicated to a single task as in microwave ovens and medical instruments. General purpose operating systems are too big and too complicated to be appropriate for use in a special purpose application. However, some operating system services find widespread use in a variety of dedicated microprocessor applications.This paper describes three generally useful ideas for special purpose microcomputer operating systems: a system stack, a timer controller, and a keyboard handler. A device based on a Texas Instruments TMS 9980A 16 bit microprocessor (1) is presented to illustrate these ideas in a dedicated data collection system.
{"title":"Useful ideas for microcomputer operating systems","authors":"W. Cunningham, S. Wixson","doi":"10.1145/503506.503534","DOIUrl":"https://doi.org/10.1145/503506.503534","url":null,"abstract":"Microprocessor applications fall into two classes: general purpose computer systems as are found in home and hobby computers, and special applications where the microprocessor is dedicated to a single task as in microwave ovens and medical instruments. General purpose operating systems are too big and too complicated to be appropriate for use in a special purpose application. However, some operating system services find widespread use in a variety of dedicated microprocessor applications.This paper describes three generally useful ideas for special purpose microcomputer operating systems: a system stack, a timer controller, and a keyboard handler. A device based on a Texas Instruments TMS 9980A 16 bit microprocessor (1) is presented to illustrate these ideas in a dedicated data collection system.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130327071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Methods are discussed for choosing a dictionary and grammar for the subset of natural language used in referring to data base specific information. Two possibilities are explored for bettering the usual ad hoc generation of these definitions. First, methods for extracting the grammar from instances of the language are reviewed and determined to be attractive but impractical. Second, given a starter system, methods for monitoring its usage and performance are discussed. Techniques are being investigated using a developing natural language system which is a front end to medical information stored in an INGRES data base--a relational data base running under UNIX on a PDP II.
讨论了为用于引用数据库特定信息的自然语言子集选择词典和语法的方法。为改进通常临时生成这些定义的方法,探讨了两种可能性。首先,审查了从语言实例中提取语法的方法,认为这些方法有吸引力,但不切实际。其次,讨论了给定一个启动系统,监测其使用情况和性能的方法。目前正在使用一个开发中的自然语言系统对这些技术进行研究,该系统是存储在 INGRES 数据库中的医学信息的前端,该数据库是在 PDP II 上运行的 UNIX 关系数据库。
{"title":"Characterizing a subset of natural language","authors":"M. Woodyard","doi":"10.1145/503506.503560","DOIUrl":"https://doi.org/10.1145/503506.503560","url":null,"abstract":"Methods are discussed for choosing a dictionary and grammar for the subset of natural language used in referring to data base specific information. Two possibilities are explored for bettering the usual ad hoc generation of these definitions. First, methods for extracting the grammar from instances of the language are reviewed and determined to be attractive but impractical. Second, given a starter system, methods for monitoring its usage and performance are discussed. Techniques are being investigated using a developing natural language system which is a front end to medical information stored in an INGRES data base--a relational data base running under UNIX on a PDP II.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127016742","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Clinical Cardiology Computer Center (CCCC) of the University of Alabama in Birmingham has in operation a medlum-slze process control computer with a standard multlprogrammlng executive and a special sub-executlve for allocating system facilities to simultaneous users. (1,2) Two coronary care units (CCUs) and two cardiac catheterization labs (COLa) are connected to this computer. (3) In the CCU, the computer is used for calculating parameters from physiological signals sensed from critically ill patients who have suffered a heart attack or chest pain. (4) Measurements from the CCLs are useful in assessing the necessity and efficacy of surgical procedures, such as coronary bypass and valve replacements.This paper describes the use of the instrument set-up programs (ISP) in setting up physiological signals to the computer, the top-down design of the ISP system, and the structure of the system of programs.
{"title":"Modular implementation of an instrument set-up program","authors":"T. Ball, E. M. Strand, D. Zissermann","doi":"10.1145/503506.503529","DOIUrl":"https://doi.org/10.1145/503506.503529","url":null,"abstract":"The Clinical Cardiology Computer Center (CCCC) of the University of Alabama in Birmingham has in operation a medlum-slze process control computer with a standard multlprogrammlng executive and a special sub-executlve for allocating system facilities to simultaneous users. (1,2) Two coronary care units (CCUs) and two cardiac catheterization labs (COLa) are connected to this computer. (3) In the CCU, the computer is used for calculating parameters from physiological signals sensed from critically ill patients who have suffered a heart attack or chest pain. (4) Measurements from the CCLs are useful in assessing the necessity and efficacy of surgical procedures, such as coronary bypass and valve replacements.This paper describes the use of the instrument set-up programs (ISP) in setting up physiological signals to the computer, the top-down design of the ISP system, and the structure of the system of programs.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116307688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cache memory is now widely accepted as a cost effective way of improving system performance. Significant reductions in the average data access time have been achieved using very simplistic paging algorithms, such as LRU, implemented in hardware. In this paper we wish to investigate more sophisticated algorithms for the management of intelligent cache systems.
{"title":"Alternative formulations of the paging problem for cache with read through","authors":"C. J. Linn","doi":"10.1145/503506.503517","DOIUrl":"https://doi.org/10.1145/503506.503517","url":null,"abstract":"Cache memory is now widely accepted as a cost effective way of improving system performance. Significant reductions in the average data access time have been achieved using very simplistic paging algorithms, such as LRU, implemented in hardware. In this paper we wish to investigate more sophisticated algorithms for the management of intelligent cache systems.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134559721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
When analyzing the computational complexity of divide and conquer algorithms, the complexity function is usually specified by means of a recurrence relation where the argument is restricted to a subset S of the natural numbers, N. This system is then used to characterize the asymptotic behavior of the algorithm for a corresponding restricted set of inputs. A careful and sometimes complicated argument is then carried out to make assertions about the asymptotic behavior of the algorithm for all inputs (Aho, Hopcroft and Ullman [1974]). In certain cases, the argument can be greatly simplified if the complexity function and the set S have special properties. In this paper, we develop these properties for some important classes of asymptotic behavior.
{"title":"Some results on the asymptotic behavior of functions on subsets of the natural numbers","authors":"D. McAllister, Y. Patt","doi":"10.1145/503506.503547","DOIUrl":"https://doi.org/10.1145/503506.503547","url":null,"abstract":"When analyzing the computational complexity of divide and conquer algorithms, the complexity function is usually specified by means of a recurrence relation where the argument is restricted to a subset S of the natural numbers, N. This system is then used to characterize the asymptotic behavior of the algorithm for a corresponding restricted set of inputs. A careful and sometimes complicated argument is then carried out to make assertions about the asymptotic behavior of the algorithm for all inputs (Aho, Hopcroft and Ullman [1974]). In certain cases, the argument can be greatly simplified if the complexity function and the set S have special properties. In this paper, we develop these properties for some important classes of asymptotic behavior.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132926816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The PLATO IV computer-based education system is a large scale timesharing communications network capable of supporting hundreds of remote terminals. Terminals are located in offices, college campuses and high schools throughout Florida and tie into the FSU computing system by standard voice grade phone lines.Anyone who has worked with computers is aware that occasionally an interruption of service will occur. It is especially important in the PLATO environment that all users be informed if the system must be down for a short unscheduled interruption.Since all the terminals are connected via dedicated phone lines, ideally, what is needed is a way to send downtime information through the phone network without having to rely on the computer or any of its associated peripherals. The DARN (Downtime Announcement and Recovery Network) which is currently under development at FSU will provide that capability.A standard cassette recorder will play pre-recorded streams of digital data words into the communications network. The cassettes are recorded with an interactive display and character designing editor while the computer is running, and a tape recording is then made of the formatted output. Thereby, even when the computer is down, this tape can be played back in order to recreate any display which was created at an earlier session with the computer. This paper will contain a description of the hardware and software utilized in making the DARN system work.
{"title":"Down-time announcement and recovery network","authors":"Jim Dumoulin","doi":"10.1145/503506.503537","DOIUrl":"https://doi.org/10.1145/503506.503537","url":null,"abstract":"The PLATO IV computer-based education system is a large scale timesharing communications network capable of supporting hundreds of remote terminals. Terminals are located in offices, college campuses and high schools throughout Florida and tie into the FSU computing system by standard voice grade phone lines.Anyone who has worked with computers is aware that occasionally an interruption of service will occur. It is especially important in the PLATO environment that all users be informed if the system must be down for a short unscheduled interruption.Since all the terminals are connected via dedicated phone lines, ideally, what is needed is a way to send downtime information through the phone network without having to rely on the computer or any of its associated peripherals. The DARN (Downtime Announcement and Recovery Network) which is currently under development at FSU will provide that capability.A standard cassette recorder will play pre-recorded streams of digital data words into the communications network. The cassettes are recorded with an interactive display and character designing editor while the computer is running, and a tape recording is then made of the formatted output. Thereby, even when the computer is down, this tape can be played back in order to recreate any display which was created at an earlier session with the computer. This paper will contain a description of the hardware and software utilized in making the DARN system work.","PeriodicalId":258426,"journal":{"name":"ACM-SE 17","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124511957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}