Office work accounts for one-half of the total employment in the United States. In 1978 there were 15.6 million professional and technical workers, 8.8 million managers and administrators, 6.4 million salesworkers, and 17.8 million clerical workers, for a grand total of 48.6 million white-collar employees constituting 49.8 percent of all workers. 1 The Bureau of Labor Statistics projects an increase in this category of at least 24.9 percent, compared with 18.6 percent for blue-collar workers, 31.4 percent for service workers, and a decline of about 21 percent for farm workers. Although service occupations are expected to be the fastest growing occupational group during 1978-1990, the largest number of new jobs will occur in the white- and blue-collar categories. The former is expected to increase by 12.1 to 16.1 million jobs; the latter by 5.9 to 8.9 million.
办公室工作占美国总就业人数的一半。1978年,全国有专业技术工人1560万人,管理人员880万人,销售人员640万人,文职人员1780万人,白领人员4860万人,占职工总数的49.8%。美国劳工统计局(Bureau of Labor Statistics)预计,这类工人的工资至少将增长24.9%,而蓝领工人的工资增幅为18.6%,服务业工人的工资增幅为31.4%,农场工人的工资增幅约为21%。虽然服务职业预计将是1978-1990年期间增长最快的职业类别,但最多数量的新工作将出现在白领和蓝领类别。前者预计将增加1210万至1610万个就业岗位;后者减少了590万至890万。
{"title":"Office automation: New arena for old struggle","authors":"A. Mowshowitz","doi":"10.1145/800173.809728","DOIUrl":"https://doi.org/10.1145/800173.809728","url":null,"abstract":"Office work accounts for one-half of the total employment in the United States. In 1978 there were 15.6 million professional and technical workers, 8.8 million managers and administrators, 6.4 million salesworkers, and 17.8 million clerical workers, for a grand total of 48.6 million white-collar employees constituting 49.8 percent of all workers. 1 The Bureau of Labor Statistics projects an increase in this category of at least 24.9 percent, compared with 18.6 percent for blue-collar workers, 31.4 percent for service workers, and a decline of about 21 percent for farm workers. Although service occupations are expected to be the fastest growing occupational group during 1978-1990, the largest number of new jobs will occur in the white- and blue-collar categories. The former is expected to increase by 12.1 to 16.1 million jobs; the latter by 5.9 to 8.9 million.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123937203","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes. The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.
{"title":"Computer security in a non-traditional architecture","authors":"Terry A. Cureton","doi":"10.1145/800173.809696","DOIUrl":"https://doi.org/10.1145/800173.809696","url":null,"abstract":"Isolation and separation between independent processes is a fundamental requirement for computer security. Nowhere is this more important than in the separation between operating system and user processes.\u0000 The architecture of the computer for which an operating system is designed is the determining factor on which mechanisms are used to meet this requirement and how effectively it is met. The architecture can make this relatively easy, difficult, or even impossible.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124062666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The C language has developed considerably since the publication of the Kernighan and Ritchie book. The language development includes enumeration data types, a void type, long (more than 8 character) identifiers, and an expanded semantic structure. At the same time, the compiler technology that developed the Portable C Compiler (which was used to provide more than 30 production compilers on different machines) is evolving into PCC2, which offers improved maintenance and an easier porting process while handling a larger number of machine features.
{"title":"The new developments in C","authors":"Stephen C. Johnson, L. Rosler","doi":"10.1145/800173.809736","DOIUrl":"https://doi.org/10.1145/800173.809736","url":null,"abstract":"The C language has developed considerably since the publication of the Kernighan and Ritchie book. The language development includes enumeration data types, a void type, long (more than 8 character) identifiers, and an expanded semantic structure. At the same time, the compiler technology that developed the Portable C Compiler (which was used to provide more than 30 production compilers on different machines) is evolving into PCC2, which offers improved maintenance and an easier porting process while handling a larger number of machine features.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124104570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Subset/G PL/I (G for General Purpose) is a subset of full Standard PL/I. Both Subset/G PL/I and Standard PL/I are defined by standards issued by the American National Standards Institute. Subset/G evolved in the late 1970's as a result of a growing realization that full PL/I was a remarkably effective (if much maligned) language but at the same time a difficult language to implement and to teach. Subset/G was designed so as to preserve the most useful properties of PL/I while deleting features that were either little used, uneconomic to implement, or inappropriate to what we now know about good programming practice. Full Standard PL/I is a descendant of the F-level PL/I language originally developed by IBM in the early 1960's. One of the design objectives of the original language was that it should be applicable to scientific programming, commercial programming, and systems programming. Part of the original rationale for this objective was that PL/I was intended to replace Fortran, Cobol, and assembly language. But there was also another reason: the growing number of applications that spanned more than one category. Subset/G also has this design objective, although some other design objectives of early PL/I were dropped, notably the principle that any construct that could reasonably be given a meaning should be acceptable. That rationale remains a major reason why Subset/G is a significant and useful language despite the many other languages that have emerged since PL/I was first designed.
子集/G PL/I (G for General Purpose)是完整标准PL/I的子集。子集/G PL/I和标准PL/I都是由美国国家标准协会发布的标准定义的。子集/G是在20世纪70年代后期发展起来的,因为越来越多的人意识到完整的PL/I是一种非常有效的语言(如果有很多恶意),但同时也是一种难以实现和教授的语言。子集/G的设计是为了保留PL/I最有用的属性,同时删除那些很少使用的、不经济的实现或不适合我们现在所知道的良好编程实践的特性。全标准PL/I是f级PL/I语言的后代,最初由IBM在20世纪60年代早期开发。原始语言的设计目标之一是它应该适用于科学编程、商业编程和系统编程。这个目标最初的部分原因是PL/I打算取代Fortran、Cobol和汇编语言。但还有另一个原因:越来越多的应用程序跨越了一个以上的类别。子集/G也有这个设计目标,尽管早期PL/I的一些其他设计目标被删除了,特别是任何可以合理地赋予意义的结构应该是可接受的原则。尽管PL/I最初被设计出来之后出现了许多其他语言,但这个基本原理仍然是为什么子集/G是一种重要而有用的语言的主要原因。
{"title":"Subset/G PL/I and the PL/I Standard","authors":"P. Abrahams","doi":"10.1145/800173.809714","DOIUrl":"https://doi.org/10.1145/800173.809714","url":null,"abstract":"Subset/G PL/I (G for General Purpose) is a subset of full Standard PL/I. Both Subset/G PL/I and Standard PL/I are defined by standards issued by the American National Standards Institute. Subset/G evolved in the late 1970's as a result of a growing realization that full PL/I was a remarkably effective (if much maligned) language but at the same time a difficult language to implement and to teach. Subset/G was designed so as to preserve the most useful properties of PL/I while deleting features that were either little used, uneconomic to implement, or inappropriate to what we now know about good programming practice.\u0000 Full Standard PL/I is a descendant of the F-level PL/I language originally developed by IBM in the early 1960's. One of the design objectives of the original language was that it should be applicable to scientific programming, commercial programming, and systems programming. Part of the original rationale for this objective was that PL/I was intended to replace Fortran, Cobol, and assembly language. But there was also another reason: the growing number of applications that spanned more than one category. Subset/G also has this design objective, although some other design objectives of early PL/I were dropped, notably the principle that any construct that could reasonably be given a meaning should be acceptable. That rationale remains a major reason why Subset/G is a significant and useful language despite the many other languages that have emerged since PL/I was first designed.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125338076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In scrutinizing the 1981 Occupational Outlook Handbook, one cannot fail to recognize a strong positive connection between mathematical requirements in educational pre-requisites for occupational entry and the concomitant demand and remuneration of such employment. Very little research has been completed characterized by an intensive analysis of the mathematical competencies requisite for effective job functioning in specific occupations. Laws (1968) and Miller (1970) interviewed occupational representatives in technical areas and 44 occupational specializations in science. Both studies challenged the mathematical collegiate pre-requisites expected of the practitioner; Laws and Miller recommended a re-evaluation of pure mathematics requirements for employment. Saunders (1978) interviewed a single representative from each of 100 occupations and found that facility with whole numbers, decimals, use of calculators, and percentage as essential. Saunders' sample needs to be increased in order to obtain more reliable results.
{"title":"A study of the relationship between job requirements and academic requirements in computer science","authors":"J. Loase, Brian D. Monahan","doi":"10.1145/800173.809701","DOIUrl":"https://doi.org/10.1145/800173.809701","url":null,"abstract":"In scrutinizing the 1981 Occupational Outlook Handbook, one cannot fail to recognize a strong positive connection between mathematical requirements in educational pre-requisites for occupational entry and the concomitant demand and remuneration of such employment. Very little research has been completed characterized by an intensive analysis of the mathematical competencies requisite for effective job functioning in specific occupations.\u0000 Laws (1968) and Miller (1970) interviewed occupational representatives in technical areas and 44 occupational specializations in science. Both studies challenged the mathematical collegiate pre-requisites expected of the practitioner; Laws and Miller recommended a re-evaluation of pure mathematics requirements for employment. Saunders (1978) interviewed a single representative from each of 100 occupations and found that facility with whole numbers, decimals, use of calculators, and percentage as essential. Saunders' sample needs to be increased in order to obtain more reliable results.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122422282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The protection of information from unauthorized disclosure is an important consideration for the designers of any large multiuser computer system. A general purpose database management system often requires the enforcement of content-dependent security policies in which a decision to allow access must be based on the value of the data itself. Several authors ([Har76], [Sto76], [Gri76], [Sum77], [Min78], [Spo83], and others) have proposed mechanisms for implementing content-dependent security policies. Few authors, however, have investigated the properties of models for the specification of such policies. This paper identifies several problems created by inadequate models for the specification of content-dependent security policies. If a specification model is too liberal in the types of policies it can express, it may provide an increased opportunity for compromise of data. If the specification model is too conservative, it cannot express many desirable policies. Thus a flexible model which will allow a compromise between these two extremes is needed for specifying content-dependent policies. Such a model is proposed here.
{"title":"Specification of content-dependent security policies","authors":"D. Spooner","doi":"10.1145/800173.809719","DOIUrl":"https://doi.org/10.1145/800173.809719","url":null,"abstract":"The protection of information from unauthorized disclosure is an important consideration for the designers of any large multiuser computer system. A general purpose database management system often requires the enforcement of content-dependent security policies in which a decision to allow access must be based on the value of the data itself. Several authors ([Har76], [Sto76], [Gri76], [Sum77], [Min78], [Spo83], and others) have proposed mechanisms for implementing content-dependent security policies. Few authors, however, have investigated the properties of models for the specification of such policies.\u0000 This paper identifies several problems created by inadequate models for the specification of content-dependent security policies. If a specification model is too liberal in the types of policies it can express, it may provide an increased opportunity for compromise of data. If the specification model is too conservative, it cannot express many desirable policies. Thus a flexible model which will allow a compromise between these two extremes is needed for specifying content-dependent policies. Such a model is proposed here.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125178096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The UNIX Instructional Workbench (IWB) software system is a general purpose computer-assisted instruction facility implemented for the UNIX operating system. The facility is characterized by a small number of abstract structures that support a wide range of courseware designs, and flexibility in using available terminal equipment and software. The INB system provides interactive aids for developing courseware as well as the means to deliver courseware to students.
{"title":"New computer-assisted instruction system for UNIX systems","authors":"P. Matthews","doi":"10.1145/800173.809699","DOIUrl":"https://doi.org/10.1145/800173.809699","url":null,"abstract":"The UNIX Instructional Workbench (IWB) software system is a general purpose computer-assisted instruction facility implemented for the UNIX operating system. The facility is characterized by a small number of abstract structures that support a wide range of courseware designs, and flexibility in using available terminal equipment and software. The INB system provides interactive aids for developing courseware as well as the means to deliver courseware to students.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126992138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This year's ACM Annual Conference will host a unique event in the United States, the Fourth World Computer Chess Championship. ACM began sponsoring computer chess tournaments in 1970. The first world championship was held in Stockholm in 1974. Subsequent world championships were held in Toronto in 1977 and in Linz, Austria in 1980. One popular activity at ACM tournaments has been a panel discussion among the computer chess authors. This year, since the ACM is hosting the World Championship, the panel will include participants from the U.S. and Europe. We hope to hear from the authors of the three former World championship chess programs, KAISSA from the Institute for Systems Science in Moscow (1974), CHESS 4.6 from Northwestern University (1977), and BELLE from Bell Labs (1980). In addition, this year's tournament and panel will feature authors of microcomputer chess programs as well. Some of the questions to be discussed will be: Has the chess playing strength of the programs reached a plateau? Will research into “expert systems” migrate into the development of better chess programs? What is being done to use the 32-bit micros in chess programming? What about the “super” computers? We urge the audience to come prepared with questions, since these panels have elicited lively discussions in the past. This year should be no exception.
{"title":"Computer chess panel - 1983","authors":"B. Mittman","doi":"10.1145/800173.809722","DOIUrl":"https://doi.org/10.1145/800173.809722","url":null,"abstract":"This year's ACM Annual Conference will host a unique event in the United States, the Fourth World Computer Chess Championship. ACM began sponsoring computer chess tournaments in 1970. The first world championship was held in Stockholm in 1974. Subsequent world championships were held in Toronto in 1977 and in Linz, Austria in 1980. One popular activity at ACM tournaments has been a panel discussion among the computer chess authors. This year, since the ACM is hosting the World Championship, the panel will include participants from the U.S. and Europe. We hope to hear from the authors of the three former World championship chess programs, KAISSA from the Institute for Systems Science in Moscow (1974), CHESS 4.6 from Northwestern University (1977), and BELLE from Bell Labs (1980). In addition, this year's tournament and panel will feature authors of microcomputer chess programs as well.\u0000 Some of the questions to be discussed will be: Has the chess playing strength of the programs reached a plateau? Will research into “expert systems” migrate into the development of better chess programs? What is being done to use the 32-bit micros in chess programming? What about the “super” computers?\u0000 We urge the audience to come prepared with questions, since these panels have elicited lively discussions in the past. This year should be no exception.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131708443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Microcomputers are small, efficient, powerful and inexpensive. They have found many uses in commerce and industry as well as for education and enlightenment. They are so inexpensive that it is possible in some firms to put one on everybody's desk. The computers are truly personal. Personal stand-alone computers are fine for doing independent individual work. When it comes to sharing the work of others, we need an integrated system. Information created by one person should be easily available to any other person. This is a common policy in education, commerce, industry and engineering where the medium of exchange is the mainframe. Terminals allow users access to large quantities of information, as long as they are privileged to do so.
{"title":"Multiuser microcomputer systems","authors":"I. Flores","doi":"10.1145/800173.809716","DOIUrl":"https://doi.org/10.1145/800173.809716","url":null,"abstract":"Microcomputers are small, efficient, powerful and inexpensive. They have found many uses in commerce and industry as well as for education and enlightenment. They are so inexpensive that it is possible in some firms to put one on everybody's desk. The computers are truly personal.\u0000 Personal stand-alone computers are fine for doing independent individual work. When it comes to sharing the work of others, we need an integrated system. Information created by one person should be easily available to any other person. This is a common policy in education, commerce, industry and engineering where the medium of exchange is the mainframe. Terminals allow users access to large quantities of information, as long as they are privileged to do so.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133527062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Requirements engineering involves three processes: (1) problem recognition; (2) problem understanding; (3) solution space specification. [5] This paper focuses on problem recognition and problem understanding—the needs determination component of requirements engineering. During needs determination effective communication between information system users and information system designers is critical—creative exploration of the problem environment is imperative.
{"title":"Conceptual prototyping","authors":"A. C. Steele, Barbara J. Nowell","doi":"10.1145/800173.809740","DOIUrl":"https://doi.org/10.1145/800173.809740","url":null,"abstract":"Requirements engineering involves three processes: (1) problem recognition; (2) problem understanding; (3) solution space specification. [5] This paper focuses on problem recognition and problem understanding—the needs determination component of requirements engineering. During needs determination effective communication between information system users and information system designers is critical—creative exploration of the problem environment is imperative.","PeriodicalId":306306,"journal":{"name":"ACM '83","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115664323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}