Over fifteen years ago, in some inner recess of some large corporation, a perplexed company official stood pondering before a large corporate organizational chart on his office wall. In his hand he held a small square of paper on which the words "Computer Department" were inscribed. Behold one of the modern frontiersmen of twentieth century business: the first man to try to stick the in-house computer department on the company organizational chart. He probably failed to find a place with which he felt comfortable, thereby becoming the first of many who have failed to resolve this problem.
{"title":"The in-house computer department","authors":"John J. Pendray","doi":"10.1145/1479992.1480005","DOIUrl":"https://doi.org/10.1145/1479992.1480005","url":null,"abstract":"Over fifteen years ago, in some inner recess of some large corporation, a perplexed company official stood pondering before a large corporate organizational chart on his office wall. In his hand he held a small square of paper on which the words \"Computer Department\" were inscribed. Behold one of the modern frontiersmen of twentieth century business: the first man to try to stick the in-house computer department on the company organizational chart. He probably failed to find a place with which he felt comfortable, thereby becoming the first of many who have failed to resolve this problem.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129451455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The associative or content-addressed memory has been an attractive concept to computer designers ever since Slade and McMahon's 1957 paper described a "catalog" memory. Associative memories offered relief from the continuing problem presented by the typical coordinate-addressed memory which requires that an "address" be obtained or calculated before data stored at that address may be retrieved. The associative memory could acquire in a single memory access any data from memory without pre-knowledge of its location. Ordered files and sorting operations could be eliminated. Unfortunately, early associative memories were expensive, hence none found their way as the "main frame" memory into any commercial computer design.
{"title":"A production implementation of an associative array processor: STARAN","authors":"J. Rudolph","doi":"10.1145/1479992.1480023","DOIUrl":"https://doi.org/10.1145/1479992.1480023","url":null,"abstract":"The associative or content-addressed memory has been an attractive concept to computer designers ever since Slade and McMahon's 1957 paper described a \"catalog\" memory. Associative memories offered relief from the continuing problem presented by the typical coordinate-addressed memory which requires that an \"address\" be obtained or calculated before data stored at that address may be retrieved. The associative memory could acquire in a single memory access any data from memory without pre-knowledge of its location. Ordered files and sorting operations could be eliminated. Unfortunately, early associative memories were expensive, hence none found their way as the \"main frame\" memory into any commercial computer design.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130540711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
System performance evaluation techniques are of vital importance in the system design process. As depicted schematically in Figure 1, the selection of the design variables is generally accomplished by an iterative process in which the evaluation of the system cost and performance plays a crucial part.
{"title":"A methodology for computer model building","authors":"A. DeCegama","doi":"10.1145/1479992.1480032","DOIUrl":"https://doi.org/10.1145/1479992.1480032","url":null,"abstract":"System performance evaluation techniques are of vital importance in the system design process. As depicted schematically in Figure 1, the selection of the design variables is generally accomplished by an iterative process in which the evaluation of the system cost and performance plays a crucial part.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129099238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.
{"title":"Privacy and security in databank systems: measures of effectiveness, costs, and protector-intruder interactions","authors":"R. Turn, N. Shapiro","doi":"10.1145/1479992.1480052","DOIUrl":"https://doi.org/10.1145/1479992.1480052","url":null,"abstract":"The nearly seven years of concern with data privacy and security in computerized information systems have produced a variety of hardware and software techniques for protecting sensitive information against unauthorized access or modification. However, systematic procedures for cost-effective implementation of these safeguards are still lacking.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134289254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In 1971 the Government of Canada initiated a study to determine whether the computerization of personally identifiable records concerning or describing Canadian residents would diminish their quality of life or adversely affect their life chances, and to propose remedial action in the event this premise proved to be true.
{"title":"Snapshot 1971: how Canada organizes information about people","authors":"John Millar Carroll","doi":"10.1145/1479992.1480053","DOIUrl":"https://doi.org/10.1145/1479992.1480053","url":null,"abstract":"In 1971 the Government of Canada initiated a study to determine whether the computerization of personally identifiable records concerning or describing Canadian residents would diminish their quality of life or adversely affect their life chances, and to propose remedial action in the event this premise proved to be true.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134501444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The following definition for a fault detection test (fdt) will be used throughout this paper: an input sequence x (of length one or more) for a given network m is a fault detection test for fault fi, located in m, if the output response to x for m with no faults present and the output response to x for m with fi present, differ.
{"title":"Procedures for increasing fault coverage for digital networks","authors":"L. R. Hoover, J. H. Tracey","doi":"10.1145/1479992.1480043","DOIUrl":"https://doi.org/10.1145/1479992.1480043","url":null,"abstract":"The following definition for a fault detection test (<i>fdt</i>) will be used throughout this paper: an input sequence <i>x</i> (of length one or more) for a given network <i>m</i> is a fault detection test for fault <i>f</i><sup><i>i</i></sup>, located in <i>m</i>, if the output response to <i>x</i> for <i>m</i> with no faults present and the output response to <i>x</i> for <i>m</i> with <i>f</i><sup><i>i</i></sup> present, differ.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Microtext system represents a new approach to the design and implementation of a full-text retrieval system. The approach is unusual in that it integrates hardware, firmware, and software components in an attempt to provide a solution to the problems involved in processing large files of unformatted textual data. The system is based on a minicomputer specialized for high-speed full-text retrieval, through the use of a finite state search algorithm implemented in firmware.
{"title":"Microtext: the design of a microprogrammed finite state search machine for full-text retrieval","authors":"R. Bullen, J. Millen","doi":"10.1145/1479992.1480059","DOIUrl":"https://doi.org/10.1145/1479992.1480059","url":null,"abstract":"The Microtext system represents a new approach to the design and implementation of a full-text retrieval system. The approach is unusual in that it integrates hardware, firmware, and software components in an attempt to provide a solution to the problems involved in processing large files of unformatted textual data. The system is based on a minicomputer specialized for high-speed full-text retrieval, through the use of a finite state search algorithm implemented in firmware.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127066181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is always desirable to know the current state of any system. However, with most computing systems, a large class of failures can remain undetected by the system long enough to cause an integrity violation. What is needed is a technique, or set of techniques, for detecting when a system is not functioning correctly. That is, we need some way of observing the integrity of a system.
{"title":"Dynamic confirmation of system integrity","authors":"B. Borgerson","doi":"10.1145/1479992.1480003","DOIUrl":"https://doi.org/10.1145/1479992.1480003","url":null,"abstract":"It is always desirable to know the current state of any system. However, with most computing systems, a large class of failures can remain undetected by the system long enough to cause an integrity violation. What is needed is a technique, or set of techniques, for detecting when a system is not functioning correctly. That is, we need some way of observing the integrity of a system.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117092557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Many of the modern computer memories contain single-error correction capability in order to enhance reliability. In a large scale memory, an even more powerful error correction code may be desirable. In particular, a double-error correction capability can reduce the maintenance cost significantly, while keeping the unscheduled system interruptions within tolerable limits. Since most faults are effectively masked and logged out, the permanent failures can be replaced at the time of scheduled maintenance, thus leaving the user unaffected. The cost and complexity of the known double error correcting code, however, seems to outweigh the advantages. The long decoding time and large amount of redundancy in double error correction cannot be justified in every fetch instruction for the sake of correcting an occasional double error.
{"title":"An adaptive error correction scheme for computer memory system","authors":"Arvind M. Patel, M. Hsiao","doi":"10.1145/1479992.1480002","DOIUrl":"https://doi.org/10.1145/1479992.1480002","url":null,"abstract":"Many of the modern computer memories contain single-error correction capability in order to enhance reliability. In a large scale memory, an even more powerful error correction code may be desirable. In particular, a double-error correction capability can reduce the maintenance cost significantly, while keeping the unscheduled system interruptions within tolerable limits. Since most faults are effectively masked and logged out, the permanent failures can be replaced at the time of scheduled maintenance, thus leaving the user unaffected. The cost and complexity of the known double error correcting code, however, seems to outweigh the advantages. The long decoding time and large amount of redundancy in double error correction cannot be justified in every fetch instruction for the sake of correcting an occasional double error.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Any user of a computer system is aware that current systems are unreliable because of errors in their software components. While system designers and implementers recognize the need for reliable software, they have been unable to produce it. For example, operating systems such as OS/360 are released to the public with hundreds of errors still in them.
{"title":"A design methodology for reliable software systems","authors":"B. Liskov","doi":"10.1145/1479992.1480018","DOIUrl":"https://doi.org/10.1145/1479992.1480018","url":null,"abstract":"Any user of a computer system is aware that current systems are unreliable because of errors in their software components. While system designers and implementers recognize the need for reliable software, they have been unable to produce it. For example, operating systems such as OS/360 are released to the public with hundreds of errors still in them.","PeriodicalId":262093,"journal":{"name":"AFIPS '72 (Fall, part I)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1972-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121170507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}