Speeches and Papers
Total Page:16
File Type:pdf, Size:1020Kb
R. W. Bemer Speeches and P^ers 1979 On I qannotator/.field 07/27/82 14.252 MEDIA CODE 6 To: Geo rye Field# M S3 9-440 98* 248-72 38 From: Bob Bemer cc: Steve Kirk Subj: Papers Here is a list of my papers for qualification for the honoraria authorized by the Technical;Articles Program, Reprints or other establishing documents accompany this memo. 1. ~# "Information acquisition# storage# and retrieval in the office environment"# in St ate-of-the-Art Report 66# "Infor mation Technology"# Infotech International# Maidenhead# Berks.,# UK/ 1979 Nov 26-28# 7/1-7/13. #2. -# "Some history of text processing"# AFIPS Office Automa tion Conf.# Atlanta# 1 980 May 3-5. 3. -# "Office automation and invisible files"# Automati zione e I nst rume nt az i one ?# No. ?# 1 980 ?# ???# Italy. (do not have publication for reprint yet# but know it is published. Sci. Honeyweller has asked for an abstract.) ^Vj -# Presentation# Keynote Panel# 1980 NCC Personal Computing Festival# 1980 May 19. -# Presentation# 1980 NCC Pioneer Day Program (SHARE). (extensive summary published in Annals of the History of Cornputinj# Vol 3# No. 1# 1981.) -# "Incorrect data and social harm"# DATA Magazine# Copen hagen# 10# No. 9# 1980 Sep# 43-46. -# "File management for office automation"# Infotech State- of-the-Art Conference# London# 1980 November 26-28# Vol 2# 15-2,6. -# "New dimensions in text processing"# Interface '81# Las Vegas# 1981 Apr 01-02. -# "Problems and Solutions for Electronic Files in the Of fice"# Proc. A.I.C.A. Annual Conf.# Pavia# Italy# 1931 Sep 23-2 5 # 131-133. -# "Incorrect data and social harm"# Computer Security J. I# No. 2# 51-56. process# for the record) -# Standards for Keyboards# Computers & Standards (accepted) -# "Coordinated Text and Transparencies"# submitted to Prac- Section# Con nun. ACM. J*** VO*> COMPUTER SECURITY JOURNAL 100 Tower Office Park • WoburnMA01801 617/935-9200 Robert Bigelow, Editor January 30, 1981 Mr. Robert W. Bemer Honeywell, Inc. 2 Moon Mountain Trail Phoenix, Arizona 85023 Dear Bob: Many thanks for sending me your article from the September issue of Data. It's very good and I wonder whether I might reprint it, or perhaps a longer version if you have one, in the Computer Security Journal (assuming that it hasn't been published in the United States — I could have missed it). The Computer Security Journal is a semiannual periodical designed for the computer security professional. Articles cover the entire spectrum of problems faced by individuals concerned with computer security, from management to physical security, data security, communications security, computer crime and other relevant topics. The Journal's purpose is to furnish the computer security professional practical and innovative assistance in a readable fashion. When you respond, would you send me another copy of page 46; the photocopier chopped off the top two or three lines of that page. Also, if you happen to have corrected the typos in a copy, I'd certainly appreciate that one to make sure I haven't missed any. Robert Bigelow RB/ocsj P.S. Did you reserve copyright, or should I clear with Eric? If so, could you send me his current address. The one I have is from quite some time ago. A publication of the Computer Security Institute t. Lui.Jell jr. Ronald A. Fr« Nancy Frencli^P Donald Lcavitt By Howard A. Karten Kardestuncer acknowledged that Frank Vaughan provisions war* not Cvy Stall users occasionally find bugs in Strudl, followed in the design pf some of the HARTFORD, Conn. — The roof of which is updated annually by • user's Edith Hofanw tension member*. this city's $31 million civic center col group, but he said the bugs were not Kardestuncer said hie group reached Catherine Anal lapsed under a load of wet snow last Jeffry Bcdcr serious enough to have affected the these conclasioiis^fter reanalyzing the Marcia Elommthal January because of basic errors in the calculations much. original data with a system known as Howard Karten original design, according to a com Finite Elements Analysis (Final) in ad TwothyJ. Scanned puter analysis conducted by an aca Faults Itemized BradSdiulu dition to Strudl. The runs ware made demic committee investigating the in The preliminary report, which will be on the university's IBM 370/155. Marguerite Zwntara cident. Cheryl M-Gdb followed by a more detailed version Another area of concern mentioned This finding was part of a prelimi expected from the committee soon and in the report was the need for a double Barbara T. VhnScoyoc nary report of the Mayor's Academic Susan Cerrard f another by a New York consulting check on engineering calculations. JoeHunn Task Force, whose members blamed firm hired by the city, made the fol At present, standard engineering and XJ the problem in part on too much reli lowing points; ">• Ann Dooley < architectural practice is that a licensed DenisePetiki ance on computers and not enough on • Both dead loads (the weight of ma common sense. professional engines must certify the Jim Orson terials used in construction) and live calculations; a provision for an inde Engineers tend to rely on computers loads (e.g., snow) seem to have been pendent check on such calculations'is too much," according to task force J. Daniel Conger K .imderiirfirnatil not a part of many construction codes, Roy N. Freed member Howard Epstein, an associate • Buckling cf the space frame's com Epstein said he plans to mention this ALa Taylor professor of civil engineering at the Jack Stone pression members appears to have need before the appropriate profes University of Connecticut at Storrs. been one of the major modes of failure. sional groups. Commenting on double "There t/hould be a lot of hand check Bracing and the connection of interior Roy Einwtehofar checking by die city of Hartford, Kar ing done in structures Uke this [space members were inadequlte. destuncer said the additional cost of frame) because they're not the com lotyMkon • Struts used in adjusting the slope of engaging an independent consultant Mary Anne Furlong mon ones. People tend to accept any die roof on the space frame appear to would have been insignificant "After S KallsySninberi thing the computer tells them, which is have contributed to the buckling of the all," he said, "this was not a coop that a very dangerous practice," he said. structure. was going to house 10,000 chickens." Jack Edeeonston Like many engineers, the buildings Kathryn V. Dinneen designers used a software package called Structural Design Language Margaret Phelaa (Strudl) to assist in basic engineering 'sOlsen Barbara Jeannetti calculations. The mayor's committee WEJLLESLEY, Mass. — Babson Col who, through their ability to create, P^yyKJiy used the same package to investigate lege's newly created Academy of Dis 1 take risks end build, have contributed the design. tinguished Entrepreneurs honored five significantly to the well-being of the But, according to committee chair entrepreneurs including Kenneth H. economy and society. ' UeVldmer man HayrUikt Kardestuncer, also a Olsen, president of DiJItal Equipment Henry Flng professor of civil engineering at die Clarification •*-- •• • Corp., as part of the college's iiw ran university, "all the designers had to do Founder's Day ceremonies held here sr Donna TuznbuB "Shop Floor Terminals Ease Produc was to look at the data suLmittcd to the recently. tion for Truck Maker" [CW, April 24) to the appro- computer and they could see the data According to Babson's president, was not meant to give the impression 797 Wwhington Street was not right" 8. Phone: (*17)965-3800. Ralph Z. Sorertson, the academy was that terminals made by IBM and Pana They put garbage in and "they did established "to pay public honor to a sonic Corp. were incompatible with get garbage out," he added. representative group of entrepreneurs the X*rox Sigma 7 mainframe. 1 ealy stopped the broup with "guns cording to It. Edwaiw Irish, hew oi drawn." m Ithat state's police unit. Second Check " Providence police, however, claimed that since the car was recovered out of When Robert Sumler, owner of the state, they had no way of knowing it car, produced his license and registra had been returned to its owner. b.aton tion, Stowe police made a second police never informed the Providence check with the police in Providence, department of the vehicle's recovery, R.I., where the car was registered. The and it's difficult to tell what happened second check showed the car had been since Boston has so many stolen car re ie occupants of the Mercedes Benz stolen last summer in Providence but ports that it doesn't keep records very e members of an all-black band was recovered in Boston some time la long, a Providence police spokesman ed "Hawkeye" who were enroute to ter and returned to Sumler. claimed. usical engagement when they were But Providence police apparently Hawkeye members could not be ?ped. never purged the registration number reached for comment. ate police said they spotted the and theft report from the NCIC file Vans Willi I. ; ' xedes on a major interstate high- when the car was recovered, Vermont 'Number of Reasons' and ran a "routine check." Upon state police claimed. All of the law enforcement agencies AiJ DiUL Hi 4 ning the car was stolen, they in- "The system is no better than the agreed there could have been any (Continued from Page U) ned local authorities who report- people feeding information into it," ac number of reasons why the theft re- two such drives from Data Gem and Cipher Data Products, Inc.