Computer Users Society

Total Page:16

File Type:pdf, Size:1020Kb

Computer Users Society DIGITAL EQUIPMENT COMPUTER USERS SOCIETY A STEREOSCOPE DISPLAY FOR ON-LINE MONITORING OF SIMULATED TERMINAL ENGAGEMENTS Psychology Group M.1. T. Li n col n La b 0 ratory, Lexi ngto n , Mass. Thisarticlewas extracted from Technical Note 1965-58 pre­ of computer analysis. pared by Lincoln Laboratory under Electronic Systems Divi­ Moreover, on-I ine analysis has a unique advantage: the sion Contract AF19 (628)-5167. analyst may become an active participant in the process. It describes a stereoscopic, dynamic display of reentry bodies. When it reaches a given point, the program may display rel­ A simulation program on an IBM 7094 generates information evant information, rei inquish control to the analyst, and for the display and feeds it to a PDP-1 computer. The PDP-1 wait for orders. It is not difficult to imagine instances in drives a Type 340 CRT display which is viewed through a which this kind of facility would be of great value, for ex­ spec ial device by a systems analyst. The reasons for this ample, in the developmentofnew procedures of data analysis project are threefold: it is part of a larger effort to evaluate or in the invention of new system doctrine. techniques for on-line control of large computer programs A breadboard computer and display system for on-I ine anal­ that simulate systems and analyze systems data; it is intended ysis of systems is being prepared to test the val idity of these as a test of the feasibil ity of generating on commercial equip­ ideas. No prototype equipment or programs are being de­ ment a display that will give an immediate perception of veloped. Rather this is a test facility, assembled largely depth; and the display is to be used in a study of terminal from existing machinery and programs, where the systems defense doctrine with an existing simulation program. analyst can work on substantive problems on-I ine with the computer. The essential product of this effort is an under­ standing of the advantages and costs of on-I ine procedures. Background Of course, it is hoped to achieve a useful interim capacity A principal objective of Lincoln Laboratory to develop new to accelerate progress in sel ected areas. computer techn iques is to replace the present awkward pro­ cedures for using computers in the analysis of data and the A block-diagram of the system for this study is shown in Fig­ simulation of systems. At present the analyst is subject to ure 1. During live operation, calculations are made on the detays of a day to a week in obtaining results from a partic­ 7094 in Building J at Lincoln Laboratory and sent by wide­ ular computer run. If he could monitor his program during band I ink to the PDP-1 computer in Building L. The current the run and intervene on-I ine, he would achieve advantages data is shown on the display in the form of a dynamic picture of speed and efficiency. For example, whenever he per­ of RV's and interceptors. The operator makes decisions rel­ ceived the effects of an error of procedure or judgment, he evant to intercept assignments. His orders are sent back to would be abletostop the run, correct the error at once, and the 7094 via typewriter, PDP-1, and data-I ink and cause begin again. During the run, especially with good on-I ine new interceptor launches in subsequent steps. Efficient use displays, he would get an immediate appreciation of the of the 7094 is achieved by dumping the simulation program significance of the results. Often the analyst is testing a onto the disc file and making routine calculations of other hypothesis about the nature of his data or the effect of a sys­ kinds during the relatively long waits between orders from tem parameter. If the results come back while the rationale the analyst at the PDP-l. During the display-development that led tothe hypothesis is still fresh in his mind, his appre­ phase reported here, output of the 7094 simulation program ciation of the results is I ikely to be more rapid and profound. was recorded on tape and run off-I ine at the PDP-l to test For these reasons an on-line facilityshould provide a marked the display techniques. The dotted lines in Figure 1 indicate improvement in efficiency and speed over the present methods the tape links between the cOiilputers. target and the interceptor farms are at the bottom near the I left-hand margin. Reentering objects enter at the upper right, and the nominal trajectory to the target is in the fron­ ~--~- tal plane. The "standard picture," the largest area avai~. I abletothe operator, is about 250 km wide and 120 km hig,~ and depth is perceived readily in the range between 50 km in front of the reentry plane and 50 km behind it. The dis­ play is quantized, and the unit of quantization (which is set by the logical circuitry that drives the CRT) is 1/4 km in WIDEBAND LINK width and height, and 2 km in depth. There is an X2 expanded view. A sel ected volume 125 km wide by 60 km high is expanded by a factor of two in each BUILDING J BUILDING L of the three dimensions--width, height, and depth--and fills the entire display. Off-centering of the expanded area is Figure 1 Block Diagram Experimental On-L ine System provided in the lateral and vertical dimensions, but not in depth. Expansions of X4 and X8 are also provided. Since the unit of quantization is a fixed distance on the face of the The Display CRT, the quantization error in kilometers decreases by a factor of two in all three dimensions with each factor of two The input to the display consists of two kinds of information: in expansion. the locations of objects at successive times and a table of interceptor assignments. The position of each object, RV or The current (or latest) position of each object is represented interceptor, is given in three coordinates of space at 1-second by a point, as in Figure 2. Directly below the point, and intervals beginning at the time of appearance of the first RV. perceived at the same depth, is a number tag representing A table, which is kept up to date second by second, shows the depth of the object in kilometers. (The number "50" is the number of the RV to which each interceptor is assigned. arbitrarily set to represent the depth of the nominal trajec­ The most difficult display requirement is to achieve a com­ tory plane.) Alternatively, the tags may be changed so that plete picture of an engagement--one that presents objects they refer to the numher of the objects in the simulation in three-dimensional space and changes as the engagement program. progresses. Several techniques were considered. For ex­ ample, considerable work has been done recently on the use ., of relative motion as a method for obtaining a perception " " .. ., ,""",,' ".,.", of depth with a computer-driven display. This method con­ 58,," ...... " ...... -:, ...... ... 62'- " ... ...... sists of showing the changing two-dimensional projection RV's 70-;::::::" of a cluster of lines while the cluster is rotating in space. { Previous research at Lincoln Laboratory by Green et al* .. 58} 27 showed that depth is readily perceived during rotation, even ........ 39 INTERCEPTORS . : ••.• 22 if the cluster is made up of a haphazard arrangement of ele­ ..... ments. However, in the case where the elements move with TARGET respect to one another, as do RV's and interceptors in a ter­ minal engagement, the change due to rotation is confounded with change of relative position among the objects. Thus, Figure 2 Analyst's View of Reentry Events an accurate perception of the position of the objects over time seemed out of the question for this appl ication. The dynamics of the engagement are presented by showing *Figure coherence in the kinetic depth effect. J. exp. the analyst 8 seconds of history for each object. The RV Psychol ., 1961, Vol. 62, No.3, 272-282. trails are dashes; the length of the dash is proportional to depth--the longer dashes indicating closer objects. Inter­ ceptor trails are represented by a series of dots. Current The only reasonable way to achieve depth perception ap­ peared to be to use the time-honored principleof the stereo­ position and the number tag are bright and steady, but the scope. A separate view was presented to each eye. Appro­ trailsof interceptor dots and RVdashes are presented in rapid priate geometrical discrepancies were introduced--discrep­ sequence. The timing is such that there are repeated cycles ancies in keeping with the sl ightly disparate views of two of apparent movement along the trail up to the current posi­ eyes viewing objects distributed in depth and viewed at tion. If the analyst wants to review an earl ier portion of the short range--about 30 inches. The two views were painted engagement, i.e. back up in time, he may temporarily des­ on the CRT in an unusual orientation and were seen through ignate any earl ier second as II current time. II He will then. a viewing device. see the positions of the objects at that time, with the usu~ 8 seconds of history behind them. Looking through the viewer, the analyst sees a side view of A maximum of 32 RV's and 32 interceptors may be shown. the engagement, except that his view includes depth. The With that many objects on the display, the analyst needs some way of clarifying the picture.
Recommended publications
  • Computer Managed Instruction in Navy Training. INSTITUTION Naval Training Equipment Center, Orlando, Fla
    DOCUMENT RESUME ED 089 780 IR 000 505 AUTHOR Middleton, Morris G.; And Others TITLE Computer Managed Instruction in Navy Training. INSTITUTION Naval Training Equipment Center, Orlando, Fla. Training Analysis and Evaluation Group. REPORT NO NAVTRADQUIPCEN-TAEG-14 PUB DATE Mar 74 NOTE 107p. ERRS PRICE MF-$0.75 HC-$5.40 PLUS POSTAGE DESCRIPTORS *Computer Assisted Instruction; Computers; Cost Effectiveness; Costs; *Educational Programs; *Feasibility Studies; Individualized Instruction; *Management; *Military Training; Pacing; Programing Languages; State of the Art Reviews IDENTIFIERS CMI; *Computer Managed Instruction; Minicomputers; Shipboard Computers; United States Navy ABSTRACT An investigation was made of the feasibility of computer-managed instruction (CMI) for the Navy. Possibilities were examined regarding a centralized computer system for all Navy training, minicomputers for remote classes, and shipboard computers for on-board training. The general state of the art and feasibility of CMI were reviewed, alternative computer languages and terminals studied, and criteria developed for selecting courses for CMI. Literature reviews, site visits, and a questionnaire survey were conducted. Results indicated that despite its high costs, CMI was necessary if a significant number of the more than 4000 Navy training courses were to become individualized and self-paced. It was concluded that the cost of implementing a large-scale centralized computer system for all training courses was prohibitive, but that the use of minicomputers for particular courses and for small, remote classes was feasible. It was also concluded that the use of shipboard computers for training was both desirable and technically feasible, but that this would require the acquisition of additional minicomputers for educational purposes since the existing shipboard equipment was both expensive to convert and already heavily used for other purposes.
    [Show full text]
  • Typology of Programming Languages E Early Languages E
    Typology of programming languages e Early Languages E Typology of programming languages Early Languages 1 / 71 The Tower of Babel Typology of programming languages Early Languages 2 / 71 Table of Contents 1 Fortran 2 ALGOL 3 COBOL 4 The second wave 5 The finale Typology of programming languages Early Languages 3 / 71 IBM Mathematical Formula Translator system Fortran I, 1954-1956, IBM 704, a team led by John Backus. Typology of programming languages Early Languages 4 / 71 IBM 704 (1956) Typology of programming languages Early Languages 5 / 71 IBM Mathematical Formula Translator system The main goal is user satisfaction (economical interest) rather than academic. Compiled language. a single data structure : arrays comments arithmetics expressions DO loops subprograms and functions I/O machine independence Typology of programming languages Early Languages 6 / 71 FORTRAN’s success Because: programmers productivity easy to learn by IBM the audience was mainly scientific simplifications (e.g., I/O) Typology of programming languages Early Languages 7 / 71 FORTRAN I C FIND THE MEAN OF N NUMBERS AND THE NUMBER OF C VALUES GREATER THAN IT DIMENSION A(99) REAL MEAN READ(1,5)N 5 FORMAT(I2) READ(1,10)(A(I),I=1,N) 10 FORMAT(6F10.5) SUM=0.0 DO 15 I=1,N 15 SUM=SUM+A(I) MEAN=SUM/FLOAT(N) NUMBER=0 DO 20 I=1,N IF (A(I) .LE. MEAN) GOTO 20 NUMBER=NUMBER+1 20 CONTINUE WRITE (2,25) MEAN,NUMBER 25 FORMAT(11H MEAN = ,F10.5,5X,21H NUMBER SUP = ,I5) STOP TypologyEND of programming languages Early Languages 8 / 71 Fortran on Cards Typology of programming languages Early Languages 9 / 71 Fortrans Typology of programming languages Early Languages 10 / 71 Table of Contents 1 Fortran 2 ALGOL 3 COBOL 4 The second wave 5 The finale Typology of programming languages Early Languages 11 / 71 ALGOL, Demon Star, Beta Persei, 26 Persei Typology of programming languages Early Languages 12 / 71 ALGOL 58 Originally, IAL, International Algebraic Language.
    [Show full text]
  • Pdp11-40.Pdf
    processor handbook digital equipment corporation Copyright© 1972, by Digital Equipment Corporation DEC, PDP, UNIBUS are registered trademarks of Digital Equipment Corporation. ii TABLE OF CONTENTS CHAPTER 1 INTRODUCTION 1·1 1.1 GENERAL ............................................. 1·1 1.2 GENERAL CHARACTERISTICS . 1·2 1.2.1 The UNIBUS ..... 1·2 1.2.2 Central Processor 1·3 1.2.3 Memories ........... 1·5 1.2.4 Floating Point ... 1·5 1.2.5 Memory Management .............................. .. 1·5 1.3 PERIPHERALS/OPTIONS ......................................... 1·5 1.3.1 1/0 Devices .......... .................................. 1·6 1.3.2 Storage Devices ...................................... .. 1·6 1.3.3 Bus Options .............................................. 1·6 1.4 SOFTWARE ..... .... ........................................... ............. 1·6 1.4.1 Paper Tape Software .......................................... 1·7 1.4.2 Disk Operating System Software ........................ 1·7 1.4.3 Higher Level Languages ................................... .. 1·7 1.5 NUMBER SYSTEMS ..................................... 1-7 CHAPTER 2 SYSTEM ARCHITECTURE. 2-1 2.1 SYSTEM DEFINITION .............. 2·1 2.2 UNIBUS ......................................... 2-1 2.2.1 Bidirectional Lines ...... 2-1 2.2.2 Master-Slave Relation .. 2-2 2.2.3 Interlocked Communication 2-2 2.3 CENTRAL PROCESSOR .......... 2-2 2.3.1 General Registers ... 2-3 2.3.2 Processor Status Word ....... 2-4 2.3.3 Stack Limit Register 2-5 2.4 EXTENDED INSTRUCTION SET & FLOATING POINT .. 2-5 2.5 CORE MEMORY . .... 2-6 2.6 AUTOMATIC PRIORITY INTERRUPTS .... 2-7 2.6.1 Using the Interrupts . 2-9 2.6.2 Interrupt Procedure 2-9 2.6.3 Interrupt Servicing ............ .. 2-10 2.7 PROCESSOR TRAPS ............ 2-10 2.7.1 Power Failure ..............
    [Show full text]
  • A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book)
    A Politico-Social History of Algolt (With a Chronology in the Form of a Log Book) R. w. BEMER Introduction This is an admittedly fragmentary chronicle of events in the develop­ ment of the algorithmic language ALGOL. Nevertheless, it seems perti­ nent, while we await the advent of a technical and conceptual history, to outline the matrix of forces which shaped that history in a political and social sense. Perhaps the author's role is only that of recorder of visible events, rather than the complex interplay of ideas which have made ALGOL the force it is in the computational world. It is true, as Professor Ershov stated in his review of a draft of the present work, that "the reading of this history, rich in curious details, nevertheless does not enable the beginner to understand why ALGOL, with a history that would seem more disappointing than triumphant, changed the face of current programming". I can only state that the time scale and my own lesser competence do not allow the tracing of conceptual development in requisite detail. Books are sure to follow in this area, particularly one by Knuth. A further defect in the present work is the relatively lesser availability of European input to the log, although I could claim better access than many in the U.S.A. This is regrettable in view of the relatively stronger support given to ALGOL in Europe. Perhaps this calmer acceptance had the effect of reducing the number of significant entries for a log such as this. Following a brief view of the pattern of events come the entries of the chronology, or log, numbered for reference in the text.
    [Show full text]
  • Modern Programming Languages CS508 Virtual University of Pakistan
    Modern Programming Languages (CS508) VU Modern Programming Languages CS508 Virtual University of Pakistan Leaders in Education Technology 1 © Copyright Virtual University of Pakistan Modern Programming Languages (CS508) VU TABLE of CONTENTS Course Objectives...........................................................................................................................4 Introduction and Historical Background (Lecture 1-8)..............................................................5 Language Evaluation Criterion.....................................................................................................6 Language Evaluation Criterion...................................................................................................15 An Introduction to SNOBOL (Lecture 9-12).............................................................................32 Ada Programming Language: An Introduction (Lecture 13-17).............................................45 LISP Programming Language: An Introduction (Lecture 18-21)...........................................63 PROLOG - Programming in Logic (Lecture 22-26) .................................................................77 Java Programming Language (Lecture 27-30)..........................................................................92 C# Programming Language (Lecture 31-34) ...........................................................................111 PHP – Personal Home Page PHP: Hypertext Preprocessor (Lecture 35-37)........................129 Modern Programming Languages-JavaScript
    [Show full text]
  • PDP-8 Simulator Manual
    PDP-8 Simulator Usage 30-Apr-2020 COPYRIGHT NOTICE The following copyright notice applies to the SIMH source, binary, and documentation: Original code published in 1993-2016, written by Robert M Supnik Copyright (c) 1993-2016, Robert M Supnik Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL ROBERT M SUPNIK BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of Robert M Supnik shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization from Robert M Supnik. 1 Simulator Files.............................................................................................................................3
    [Show full text]
  • Language-Parametric Methods for Developing
    Gabriël Ditmar Primo Konat was born in The Language-Parametric Methods for Developing Interactive Programming Systems Language-Parametric Methods for Developing Interactive Programming Hague, the Netherlands. In 2009, he received his BSc in Computer Science from the Institute of Ap- Invitation plied Sciences in Rijswijk. In 2012, he received his MSc in Computer Science from Delft University of Technology (TUDelft). From 2012 to 2018, he was Language-Parametric a Ph.D. student with the Programming Languages Methods for Developing group at TUDelft, under supervision of Eelco Viss- Interactive Programming er and Sebastian Erdweg. His work focuses on lan- Systems guage workbenches and incremental build systems. Gabriël Konat [email protected] You are cordially invited to the public defense of my dissertation on Monday, November 18th, 2019 at 3pm. At 2:30pm, I will give a brief presentation summarizing my dissertation. The defense will take place in the Senaatszaal of the Delft University of Technology Auditorium, Mekelweg 5, 2628 CC Delft, the Netherlands Afterwards, there will be a Gabriël Konat Language-Parametric Methods for reception. Developing Interactive Programming Systems Gabriël Konat Propositions accompanying the dissertation Language-Parametric Methods for Developing Interactive Programming Systems by Gabriël Ditmar Primo Konat 1. Language-parametric methods for developing interactive programming sys- tems are feasible and useful. (This dissertation) 2. Compilers of general-purpose languages must be bootstrapped with fixpoint bootstrapping. (This dissertation) 3. Manually implementing an incremental system must be avoided. (This dissertation) 4. Like chemists need lab assistants, computer scientists need software engineers to support them in research, teaching, and application in industry. 5.
    [Show full text]
  • TASK \ OS TASK \ OS TASK \ OS Show/Set EEPROM
    TASK \ OS OS notes administrative GUI managing users TASK \ OS list hardware configuration unique id useful for licensing show/set EEPROM/NVRAM values add device without reboot remove device tape device stdin/ stdout/ stderr X kvm config TASK \ OS read a disk label whole disk in partition label a disk partition a disk TASK \ OS kernel show/set kernel parameters limit physical memory loaded kernel modules load module unload module make disk bootable startup scripts start/ stop/ config services shutdown (& power off if possible) run levels 1 *=normal states for more detail see www.phildev.net/runlevels.html show runlevel 1 time zone info check swap space bind process to CPU TASK \ OS "normal" filesystem volume-based filesystem file system description volume manipulation create filesystem create non-0-length empty file mount CDROM eject CDROM create/mount ISO image ACL management Fibre Channel / SAN TASK \ OS NFS share definitions NFS share command NFS information name resolution order show network interface info change IP start DHCP client ping one packet sniff network route definitions telnetd, ftpd banner set date/time (from net: ntp or other) TASK \ OS auditing encrypted passwords in min password length allow/deny root logins firewall config TASK \ OS show installed software file is in which package add software precompiled binaries of GPLware and freeware C compiler show patch level and/or patches patch tool configure/show runtime linking fortran-2000.com/ ArnaudRecipes/ sharedlib.html link library path tracing utility define user defaults csh global .login default syslog and messages system error reporting tool performance monitoring match process to file or port X pop-up Wikipedia FAQs (see also faqs.org) mailing list mailing list archives man pages www.freebsd.org/ cgi/man.cgi newsgroup(s) and forums groups.google user groups magazines vendor home page vendor docs and patches (see also man pages) vendor phone (US) wikis FreeBSD Derived from 4.4BSD-Lite and 386BSD.
    [Show full text]
  • Stan-(X-249-71 December 1971
    S U326 P23-17 AN ANNOTATED BIBLIOGRAPHY ON THE CONSTRUCTION OF COMPILERS . BY BARY W. POLLACK STAN-(X-249-71 DECEMBER 1971 - COMPUTER SCIENCE DEPARTMENT School of Humanities and Sciences STANFORD UNIVERS II-Y An Annotated Bibliography on the Construction of Compilers* 1971 Bary W. Pollack Computer Science Department Stanford University This bibliography is divided into 9 sections: 1. General Information on Compiling Techniques 2. Syntax- and Base-Directed Parsing c 30 Brsing in General 4. Resource Allocation 59 Errors - Detection and Correction 6. Compiler Implementation in General - 79 Details of Compiler Construction 8. Additional Topics 9* Miscellaneous Related References Within each section the entries are alphabetical by author. Keywords describing the entry will be found for each entry set off by pound signs (*#). Some amount of cross-referencing has been done; e.g., entries which fall into Section 3 as well as Section 7 will generally be found in both sections. However, entries will be found listed only under the principle or first author's name. Computing Review citations are given following the annotation when available. "this research was supported by the Atomic Energy Commission, Project ~~-326~23. Available from the Clearinghouse for Federal Scientific and Technical Information, Springfield, Virginia 22151. 0 l/03/72 16:44:58 COMPILER CONSTRUCTION TECHNIQUES PACFl 1, 1 ANNOTATED RTBLIOGRAPHY GENERAL INFORMATION ON COMP?LING TECHNIQOES Abrahams, P, W. Symbol manipulation languages. Advances in Computers, Vol 9 (196R), Sl-111, Academic Press, N. Y. ? languages Ic Anonymous. Philosophies for efficient processor construction. ICC Dull, I, 2 (July W62), 85-89. t processors t CR 4536.
    [Show full text]
  • Dec Pdp-11, 1970
    resource sharing: timesharing use of high-speed input/outp RSTSll terminal users may have Examples of the value of the Resource another terminal exclusive use of any peripheral 09 a Sharing concept are: one user may use the punched-card file whi8 timesharing system (except the disk, line printer, card reader, tape and BASIC program he ha% which is a shared device). They may use disk files for performing a "batch" off-line card punch. - it as long as needed, and then return it adrmnistrative data processing task; for assignment to another user. The another terminal user may use a ability to enter, store, and retrieve DECtape unit for retrieving or creating a programs and data files using high-speed tape file intended for off-line storage; peripheral devices makes RSTS-11 a true and when thecard reader is free, yet general-purpose problem-solving system. RSTS for business and administrative problem solving One of the most difficult problems facing Potential On-Line Administrative business today is increasing the Applications include: productivity of costly, hard-to-find clerks and secretaries. RSTS-11's power and Order Entry/Accounts Receivable/ flexibility offer the benefits of reduced Sales Analysis costs, increased customer satisfaction, Inventory Control/Accounts Payable and increased job satisfaction for clerical Data Entry with automatic error workers. checking, editing, and verification Inquiry-Response for "instant" access How RSTSll Benefits Administrative to records. Applications Journals, general ledger, and other account records are stored on-line for RSTSll can be dedicated in quick access from high-speed disk administrative application systems. The storage, thus reducing paper handling.
    [Show full text]
  • 1963 Zleaz600k of the SEVENTH-DAY ADVENTIST DENOMINATION
    1963 Zleaz600k OF THE SEVENTH-DAY ADVENTIST DENOMINATION A DIRECTORY OF The General Conference, World Divisions, Union and Local Conferences and Missions, Educational Institutions, Hospitals and Sanitariums, Publishing Houses, Periodicals, and Denominational Workers. Edited and Compiled by E. L. Becker, Statistical Secretary General Conference of Seventh-day Adventists Roconsii'wEed in 1961) Published by REVIEW AND HERALD PUBLISHING ASSOCIATION WASHINGTON 12, D.C. PRINTED IN U.S.A. Contents Preface (Statistical Data) 4 Fundamental Beliefs of Seventh-day Adventists 5 Constitution and Bylaws 6 General Conference and Departments 12 Divisions: North American 22 Australasian 76 Central European 94 China 102 Far Eastern 104 Inter-American 130 Middle East 150 Northern European 156 South American 174 Southern African 194 Southern Asia 218 Southern European 232 Union of Socialist Soviet Republics 254 Institutions: Educational 255 Food Companies 321 Medical 327 Dispensaries and Clinics 349 Old People's Homes and Orphanages 352 Publishing Houses 353 Periodicals Issued 363 Advertisers 432 Statistical Tables 375 Countries Where S.D.A. Work Is Established 377 Necrology 390 Index of Institutional Workers 391 Directory of Workers 435 Special Days and Offerings for 1963 577 General Index 581 3 Preface A directory of the conferences, mission was established. The first denominational fields and institutions connected with the school was opened in 1872. Tract and mis- Seventh-day Adventist denomination is given sionary society work was organized on a in the following pages. Administrative and state-wide basis in 1870, and state Sabbath workers' lists have been furnished by the school associations in 1877. The name, "Sev- organizations concerned.
    [Show full text]
  • Writing Cybersecurity Job Descriptions for the Greatest Impact
    Writing Cybersecurity Job Descriptions for the Greatest Impact Keith T. Hall U.S. Department of Homeland Security Welcome Writing Cybersecurity Job Descriptions for the Greatest Impact Disclaimers and Caveats • Content Not Officially Adopted. The content of this briefing is mine personally and does not reflect any position or policy of the United States Government (USG) or of the Department of Homeland Security. • Note on Terminology. Will use USG terminology in this brief (but generally translatable towards Private Sector equivalents) • Job Description Usage. For the purposes of this presentation only, the Job Description for the Position Description (PD) is used synonymously with the Job Opportunity Announcement (JOA). Although there are potential differences, it is not material to the concepts presented today. 3 Key Definitions and Concepts (1 of 2) • What do you want the person to do? • Major Duties and Responsibilities. “A statement of the important, regular, and recurring duties and responsibilities assigned to the position” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/classifierhandbook.pdf • Major vs. Minor Duties. “Major duties are those that represent the primary reason for the position's existence, and which govern the qualification requirements. Typically, they occupy most of the employee's time. Minor duties generally occupy a small portion of time, are not the primary purpose for which the position was established, and do not determine qualification requirements” SOURCE: https://www.opm.gov/policy-data- oversight/classification-qualifications/classifying-general-schedule-positions/positionclassificationintro.pdf • Tasks. “Activities an employee performs on a regular basis in order to carry out the functions of the job.” SOURCE: https://www.opm.gov/policy-data-oversight/assessment-and-selection/job-analysis/job_analysis_presentation.pdf 4 Key Definitions and Concepts (2 of 2) • What do you want to see on resumes that qualifies them to do this work? • Competency.
    [Show full text]