Source Documents on the History of Character Codes, 1972-1975

Total Page:16

File Type:pdf, Size:1020Kb

Source Documents on the History of Character Codes, 1972-1975 ' f ; a view of ij the history of I the ISO character code FROM THE EDITOR R. W. Berner Honeywell Information Systems This is another Phoenix, AZ, documented personal recollection of the US development of basic data processing tools. The char- acter code is perhaps the most fundamental of all such tools. We can program without COBOL, but not with- out coded representations of our most common sym- bols for calculation and language. Even the Japanese have found it necessary to represent their most elemen- tary alphabet, Kata Kana, in code suitable for computer processing. ORIGINS PRESSURES AND MOTIVATIONS Encoding of character sets has taken many forms — sema- Some early phore, pressures for code expansion Morse code for telegraphs, and mechanical came from pro-! I linkages gramming languages. or typesetting Univac I, the first computer machines. It did with al- i not become permanent and phabetic input, had a 1 5 -character set on its interchangeable until the advent of printer. The IBM perforated tape and set had mechanical punch keypunch limitations to 48 cards, representing the continuous and characters jfi discrete me- mostly business symbols. Starting in 1 the dia. Except for looms, punch cards were 954, need for FOR-!} used first for count- TRAN (mathematical ing and and arithmetic) symbols to statistical applications, take the ? requiring at first only a same encodings as these business 1 2 -character symbols led to con-i set - 1 0 digits and 2 signs. much || Perforated tape was fusion in used installations that did both types of work. first for message communication, Pressures! fj and the 5-track tape arose for unique encodings 1 [1,3,4,126], In 1 offered 60 characters - 30 encodings 956 September ft had double meaning " was decided «hal the ' following Figure IBM Stretch computer would have Shift and Letter Shift, the other two combi- a 64-bit word, and that the nations. characters would I This code was due to Baudot, be represented ! and the assignment by 8 bits of codes [19,70], This decision had much influence to characters was made (for on sub- alphabet only) on the sequent computer basis architecture. The Los of letter usage Alamos group de- f frequency, to conserve electrical energy. vised its own input character Both perforated set, and IBM built a special tape and cards, i being available, replaced entry typewriter for it 10 . manual [ ], switches as input devices for computers (cards The advent of ALGOL in 1 958, with (in theory) predominating in the US, 1 1 6 single!' I perforated tape in Europe and symbols, was the impetus for many elsewhere). Most early computing work was proposals. H. S Bright: i computational, proposed one such and the set to the IBM SHARE organization punch card set did not ont ! receive much impetus for 8 September 11, 1 enlargement as a “point of departure for " until application to business problems. hardware implementation of In the IAL“ [4], Often one the late 1 it to be ahead of his 950s became apparent that code expansion | j time, his tableau showed the European had grown uncontrolled. There were “one" and the letter 3 more than ’ 20 varia- °h Wlth a curlicue. tions of the Yet he objected to SHARE asking punch card code [1 29,13 IBM i! { 1J, and more than 60 for more than different 128 characters presentable in internal representations media and 1) ! in computers [12], equipment unless someone was able to The Baudot prove the need. ! Code was not without its variations, J although Others foresaw the the need very well, and there 1 CCITT (Consultative Committee was much f International for Tele- work going on graph within IBM at the time, following and Telephone) Working Alphabet on the f }j No. 2 was used for Stretch decision. interchange The 1403 chain printer was being throughout much of the world. Even devel- so, the oped, the 240 positions around binary the chain permitting f positional 2 sets i l l notation was perturbed by different assign- of 1 20 or 4 sets of 60, in addition to the planned ments of bits to the tracks. 5 sets of l’ j 48 for the traditional IBM set. $ ! 274 HONEYWELL COMPUTER JOURNAL v/o\ q ISO (International Standardization Organization) EARLY STANDARDIZATION EFFORTS In the Sturen) that recom- it was Sweden (probably Olle • area, III processing standards. mended, in late 1 959, activities in data future for computers became clearer in 1958 and The real Geneva on 1961 outgrowing the period This led to a Round Table Conference in 1959. Data processing centers were of ISO/TC97, affair, May 16, which in turn led to the formation when information processing was primarily a local had Computers and Information Processing, for which the US some connection to communications networks and Working Croups were interchange, as for was assigned the secretariat. Several been made. First to emerge was data Character Sets. Service established, in particular WG B, on Coded ^ial Security Administration and Internal Revenue j formed in 1961 May, and had liaison program interchange, more difficult be- ECMA had just been ; records. Then came meeting. Its corresponding varied. representation at the Geneva I cause both symbols and encodings projects began at body for codes was Technical Committee 1. Several independent standardization about this time: US CONTRIBUTIONS Institution (BSD, starting with paper : British Standards j The punched cards, gradually moving into the gen- tape and The 1960 January meeting of ASA had led to the formation problem. eral of Sectional Committee X3, with the same name as TC97. ‘ SHARE, seeking to coordinate its IBM equipment. and X3.2 (Codes X3 held its first meeting on 1 960 August 4, which also started The Electronic Industries Association, by I.C. Lig- and Input-Output) its first on October 4, chaired aspect, partly due to impetus I first from the paper tape con- gett of IBM, who was directing IBM efforts (other work from Numerical Control. established tinued in the US until X3.2 jurisdiction was i;j* Department of Defense, for, whom the Signal The US authoritatively). Membership was from the Federal Govern- developed the Fieldata Code (which, despite Corps ment, data processing, and communications interests. drawbacks, was a great improvement on existing codes, The latter were represented primarily by the Bell System, ISO code). The and many of its features are seen in the to dial which was to convert its TWX service from manual in the Uni- Fieldata Code still exists as the internal code operation in 1962. Along with this was a new transmission vac 1107, 1108, and 1110. in arrangement that enabled 100 word-per-minute service that the addition to the existing 60 wpm service. This meant there IBM was also doing much work in codes, for in 1959 majority of teletypewriters (Model 15, limited to 75 wpm) were 9 different internal codes existing in IBM equipment, would have to be replaced. To Bell, and to John Auwaerter of and interchange on media was a problem. Development Teletype, this seemed an excellent opportunity to escape and of 8000 series (precursor of the 360) was under way, the from the limitations of 5-level Baudot Code and the 3-row between group (in IBM) was planning the coordination my keyboard to a 4-row keyboard more similar to conventional and media representation, following on the Stretch codes typewriters. The Bell System was not only an active partici- 1959 November memo to V.P. John McPherson work. A pant, but actually hastened development by adopting con- used by all outlined a plan for a "single character set to be them clusions as fast as they were reached and incorporating the external stor- future computer systems ... the code to be tape track in their new designs. It even chose the perforated machine code" (i.e., direct age code as well as internal it assignment in advance of that standard, and thus made 8-bit set. representation in punch cards, as well). It was an of rather easy to reach agreement because of the volume Cosden saw this work in the Fall of 1959 and ar- John Model 33 and 35 equipment in actual operation. be invited to make a presentation to the BSI ranged for me to X3.2 did extensive work on development of criteria for a in 1960 February. This codes committee, which occurred collating sequence and code. It considered aspects such as ' established a very important contact point with Hugh natural orderings of subsets, keyboard design consider- colloquially McGregor Ross (for a while the code was known of ations, and programming effects such as manipulation Association) in ECMA (European Computer Manufacturers graphics by classes, simpler language scans, and more circles as the Bemer-Ross code). graphics for clarity of printed output. This was all based upon the assumption of a dense 6-bit code, as used by almost all EXPANDING THE JURISDICTION computers of the time (Stretch was the exception, at 8 bits). No existing code was found to be satisfactory. The Fiel- final stages as Military Standard 1 88 [72], was in its rapid multinational growth, data Code, It was natural that IBM, with offered for consid- adoption in 1 959 December, and was would take a strong interest in the standardization process. of for communications, al- drew up eration. However, it was primarily Jim Birkenstock, V.P. of Commercial Development, the process. For Insti- though computer equipment was used in plans to revitalize the Office Equipment Manufacturers that control codes and Manufacturers data processing, it had the defect tute and convert it to the Business Equipment graphics were intermingled in 3 of the 4 columns.
Recommended publications
  • Mobile Digital Computer Program. Mobidic D
    UNCLASSIFIED AD 4 7_070 DEFENSE DOCUMEI'TATION CENTER FOR SCIENTIFIC AND TECHNIA!. INFO'UMATION CAMERON STATION, ALEXANDRW , VIFGINI, UNCLASSIFIED NOTICE: When government or other drawings, speci- fications or other data are used for any purpose other than in connection with a definitely related government procurement operation, the U. S. Government thereby incurs no responsibility, nor any obligation whatsoever; and the fact that the Govern- ment may have formulated, furnished, or in any way supplied the said drawings, specifications, or other data is not to be regarded by implication or other- wise as in any manner licensing the holder or any other person or corporation, or conveying any rights or permission to manufacture, use or sell any patented invention that may in any way be related thereto. FINAL REPORT 1 FEBRUARY 1963 J a I MOBILE DIGITAL COMPUTER PROGRAM MOBIDIC D FINAL REPORT 1 July 1958 to 1 February 1963 I Signal Corps Technical Requirements I SCL 1959 SCL 4328 Contract No. DA 3 6 -039-sc-781 6 4 I DA Project No. 3-28-02-201 I Submitted by: _, _ _ _ E. W. Jer'7is, Manage'r MOBIDIC Projects February 1963 S SYLVANIA ELECTRONIC SYSTEMS-EAST SYLVANIA ELECTRONIC SYSTEMS A Division of Sylvania Electric Products Inc. 189 B Street-Needham Heights 94, Massachusetts ~• I 3 TABLE OF CONTENTS I Section Page LIST OF ILLUSTRATIONS v ILIST OF TABLES vii I PURPOSE 1-1 1U1.1 MOBIDIC D General Purpose High-Speed Computer 1-1 1.2 MOBIDIC D Program 1-1 11.2. 1 Phase I -Preliminary Design 1-1 1.2.2 Phase II-Design 1-1 1.2.3 Phase III-Construction and Test 1-2 1.2.4 Phase IV-Update MOBIDIC D to MOBIDIC 7A 1-2 I 1.2.5 Phase V-Van Installation and Test 1,-2 II ABSTRACT 2-1 III PUBLICATIONS, LECTURES, CONFERENCES & TERMINOLOGY 3-1 3.1 Publications 3-1 T3.2 Lectures 3-1 3.3 Conferences 3-2 3.4 Terminology and Abbreviations 3-10 S3.4.1 Logical and Mechanization Designations: 3-13 Central Machine and Converter S3.4.2 Logical and Mechanization Designations: - 3-45 Card Reader and Punch Buffer 3.4.
    [Show full text]
  • The Backspace
    spumante e rosato* (choose 2) per la tavola glera NV lunetta prosecco, veneto straw, baked apple, peach 11 43 farm greens :: giardiniera, red onion, pecorino romano lambrusco NV medici ermete, emilia romagna black currant, violet, graphite 10 39 lamb & pork meatballs :: stewed tomato, bread crumb, asiago, mint NV l’onesta, emilia romagna fresh strawberry, violet, orange zest 11 43 baked ricotta :: lemon, poached tomato, olive oil * lambrusco whipped lardo bruschetta :: herbs, citrus segment * aglianico 2015 feudi di san gregorio ‘ros‘aura’, irpinia, campania fresh strawberry, rose petal 12 47 shishito peppers :: melon, basil roasted corn :: ricotta, pesto bianco bombino bianco 2016 poderi dal nespoli “pagadebit”, romagna gooseberry, apple, hawthorn blossom 11 43 antipasti (choose 3) pinot grigio 2015 ronchi di pietro, friuli hazelnut, white peach, limestone 48 sweet potato :: cippolini onion, mushroom, rosemary friulano 2014 villa chiopris, friuli grave straw, white flowers, almond 10 39 braised greens :: golden raisins, pecan, red pepper falanghina 2014 terredora, campagna lemon, quince, pear 13 51 :: tomato, basil, balsamic house-made mozzarella chardonnay 2014 tenute del cabreo ‘la pietra’, chianti classico peach preserves, salted popcorn, vanilla 85 roasted beets :: celery, lemon zest, pepperoncini moscato 2015 oddera cascina di fiori, asti tangerine, peach, sage 12 47 the backspace marinated olives :: lemon, rosemary, oregano green beans :: pancetta, garlic, lemon family-style menu rosso $20 per guest pizze (choose 2) pergola rosso
    [Show full text]
  • Data Processing with Unit Record Equipment in Iceland
    Data Processing with Unit Record Equipment in Iceland Óttar Kjartansson (Retired) Manager of Data Processing Department at Skýrr, Iceland [email protected] Abstract. This paper presents an overview of the usage of unit record equipment and punched cards in Iceland and introduces some of the pioneers. The usage of punched cards as a media in file processing started 1949 and became the dominant machine readable media in Iceland until 1968. After that punched cards were still used as data entry media for a while but went completely out of use in 1982. Keywords: Data processing, unit record, punched card, Iceland. 1 Hagstofa Íslands Hagstofa Íslands (Statistical Bureau of Iceland) initiated the use of 80 column punched cards and unit record equipment in Iceland in the year 1949. The first ma- chinery consisted of tabulating machine of the type IBM 285 (handled numbers only), the associated key punch machines, verifiers, and a card sorter. See Figures 1 and 2. This equipment was primarily used to account for the import and export for Iceland. Skýrr (Skýrsluvélar ríkisins og Reykjavíkurborgar - The Icelandic State and Munici- pal Data Center) was established three years later by an initiative from Hagstofa Íslands, Rafmagnsveita Reykjavíkur (Reykjavík Electric Power Utility), and the Medical Director of Health of Iceland as was described in an earlier article [3]. Fig. 1. IBM 285 Electric Accounting Machine at Hagstofa Íslands year 1949 J. Impagliazzo, T. Järvi, and P. Paju (Eds.): HiNC 2, IFIP AICT 303, pp. 225–229, 2009. © IFIP International Federation for Information Processing 2009 226 Ó. Kjartansson Fig. 2. Early form of the data registration using a punched card.
    [Show full text]
  • IPDS Technical Reference 1
    IPDS Technical Reference 1 TABLE OF CONTENTS Manuals for the IPDS card.................................................................................................................................4 Notice..................................................................................................................................................................5 Important.........................................................................................................................................................5 How to Read This Manual................................................................................................................................. 6 Symbols...........................................................................................................................................................6 About This Book..................................................................................................................................................7 Audience.........................................................................................................................................................7 Terminology.................................................................................................................................................... 7 About IPDS.......................................................................................................................................................... 8 Capabilities of IPDS............................................................................................................................................9
    [Show full text]
  • Specialized Applications
    Specialized applications December 2008 © 2008 Avaya Inc. applicable license agreements, such as "shrinkwrap" or "clickwrap" license accompanying or applicable to the Software ("Shrinkwrap All Rights Reserved. License"). The text of the Shrinkwrap License will be available from Avaya upon End User’s request (see “Third-party Components" for Notice more information). While reasonable efforts were made to ensure that the information in Copyright this document was complete and accurate at the time of printing, Avaya Inc. can assume no liability for any errors. Changes and corrections to Except where expressly stated otherwise, the Product is protected by the information in this document might be incorporated in future copyright and other laws respecting proprietary rights. Unauthorized releases. reproduction, transfer, and or use can be a criminal, as well as a civil, offense under the applicable law. Documentation disclaimer Third-party components Avaya Inc. is not responsible for any modifications, additions, or deletions to the original published version of this documentation unless Certain software programs or portions thereof included in the Product such modifications, additions, or deletions were performed by Avaya. may contain software distributed under third party agreements ("Third Customer and/or End User agree to indemnify and hold harmless Party Components"), which may contain terms that expand or limit Avaya, Avaya's agents, servants and employees against all claims, rights to use certain portions of the Product ("Third Party Terms"). lawsuits, demands and judgments arising out of, or in connection with, Information identifying Third Party Components and the Third Party subsequent modifications, additions or deletions to this documentation Terms that apply to them is available on the Avaya Support Web site: to the extent made by the Customer or End User.
    [Show full text]
  • IBM Db2 High Performance Unload for Z/OS User's Guide
    5.1 IBM Db2 High Performance Unload for z/OS User's Guide IBM SC19-3777-03 Note: Before using this information and the product it supports, read the "Notices" topic at the end of this information. Subsequent editions of this PDF will not be delivered in IBM Publications Center. Always download the latest edition from the Db2 Tools Product Documentation page. This edition applies to Version 5 Release 1 of Db2 High Performance Unload for z/OS (product number 5655-AA1) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM® Corporation 1999, 2021; Copyright Infotel 1999, 2021. All Rights Reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Copyright International Business Machines Corporation . US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this information......................................................................................... vii Chapter 1. Db2 High Performance Unload overview................................................ 1 What does Db2 HPU do?..............................................................................................................................1 Db2 HPU benefits.........................................................................................................................................1 Db2 HPU process and components.............................................................................................................2
    [Show full text]
  • Oral History of Captain Grace Hopper
    Oral History of Captain Grace Hopper Interviewed by: Angeline Pantages Recorded: December, 1980 Naval Data Automation Command, Maryland CHM Reference number: X5142.2009 © 1980 Computer History Museum Table of Contents BACKGROUND HISTORY ...........................................................................................................3 1943-1949: MARK I, II, AND III COMPUTERS AT HARVARD....................................................6 1949-1964: ECKERT AND MAUCHLY, UNIVAC, AND THE ONE-PASS COMPILER ................7 The Need for User-Friendly Languages ..................................................................................10 DEMANDS FOR THE FUTURE..................................................................................................12 Application Processors, Database Machines, Distributed Processing ....................................12 Demand for Programmers and System Analysts ....................................................................14 The Value and Cost of Information..........................................................................................14 The Navy’s Dilemma: Micros and Software Creation..............................................................15 The Murray Siblings: Brilliant Communicators.........................................................................18 Common Sense and Distributed Computing ...........................................................................19 BACK TO 1943-1949: HOWARD AIKEN....................................................................................21
    [Show full text]
  • Standards for Computer Aided Manufacturing
    //? VCr ~ / Ct & AFML-TR-77-145 )R^ yc ' )f f.3 Standards for Computer Aided Manufacturing Office of Developmental Automation and Control Technology Institute for Computer Sciences and Technology National Bureau of Standards Washington, D.C. 20234 January 1977 Final Technical Report, March— December 1977 Distribution limited to U.S. Government agencies only; Test and Evaluation Data; Statement applied November 1976. Other requests for this document must be referred to AFML/LTC, Wright-Patterson AFB, Ohio 45433 Manufacturing Technology Division Air Force Materials Laboratory Wright-Patterson Air Force Base, Ohio 45433 . NOTICES When Government drawings, specifications, or other data are used for any purpose other than in connection with a definitely related Government procurement opera- tion, the United States Government thereby incurs no responsibility nor any obligation whatsoever; and the fact that the Government may have formulated, furnished, or in any way supplied the said drawing, specification, or other data, is not to be regarded by implication or otherwise as in any manner licensing the holder or any person or corporation, or conveying any rights or permission to manufacture, use, or sell any patented invention that may in any way be related thereto Copies of this report should not be returned unless return is required by security considerations, contractual obligations, or notice on a specified document This final report was submitted by the National Bureau of Standards under military interdepartmental procurement request FY1457-76 -00369 , "Manufacturing Methods Project on Standards for Computer Aided Manufacturing." This technical report has been reviewed and is approved for publication. FOR THE COMMANDER: DtiWJNlb L.
    [Show full text]
  • Development Standards Committee Agenda
    NOTICE OF PUBLIC MEETING TO: THE DEVELOPMENT STANDARDS COMMITTEE AND ALL OTHER INTERESTED PERSONS: Development Standards Committee August 18th, 2021 at 5:00 p.m. The Woodlands Township Notice is hereby given that the Development Standards Committee will hold a Regular Meeting on Wednesday August 18th, 2021, at 5:00 p.m., via video conference within the boundaries of The Woodlands Township in The Woodlands, Texas, which may be viewed online at http://www.thewoodlandstownship-tx.gov/778/Meeting-Videos Once selected go to “Watch Virtual Public Meetings” To call in to the August 18th, 2021 Development Standards Committee meeting to provide public comment or speak on a specific item, you may call any of the numbers listed below. For the best quality audio, it is recommended to use one of the local numbers: • (346) 248-7799 or (253) 215-8782 or (669) 900-6833 or (312) 626-6799 or (301) 715-8592 or (888) 788-0099 (Toll Free) Once you have connected, you will need to enter Webinar ID: 889 6958 5730, then enter the pound sign “#” on your telephone keypad. I. Welcome/Call Meeting to Order. II. Public Comments *See Guidelines (listed below). III. Consideration and action regarding the minutes of the meeting of July 21st, 2021. IV. Consideration and Action of items recommended for Summary Action. V. Recess to Executive Session to consult with the Development Standards Committee’s attorney pursuant to 551.071, Texas Government Code. VI. Reconvene in Public Session. VII. Consideration and Action of the Commercial Items, Applications and Covenant Violations. A. Consideration and action for the existing Bitcoin ATM machine.
    [Show full text]
  • NILES 66O YARTON BILER IL 6Y714 Èditiofl ; 4 (RJW9663900
    REC'O'J35 AUG % N o ç N1LE PUBLIC LiBRARY NILES 66O YARTON BILER IL 6Y714 Èditiofl ;_4_ (RJW9663900 VOL 39, NO.23 flIURSDYNOVEMBER301995 so CENTS PER COPY - Parkway Bank, Pontarelli --Car crashes,three police departm... ents usedto-apprehend thief - condos getgreen light byKathIeenQujrfrId Wild police chase endsin Voting unanimously, the would generate increased traffic Nues Village Board has finally congestion on their streets which laidtorestthecontroversy couldcreate unsafeconditions for -- - surrounding Parkway Bank and the areasmany children. - thief's arrest in Nues -ilssoon to be nwghhors, by Of particular concern to the By Rosemary Tirio approving the rezonrng petition residents was the exit peoposed to Niles andMorton Drove police About thetimeMulvaney to Greenwood and then proceed- permittingthe bank lo begin be developed by the hank onto joined Glenviewpolice in a highreached East Lake Avenue,aed soath ou Greenwood- to constrnction. Dobsen Street. - speed chase around 1 p.m. Nov.Glenview detective picked upon Shermer Road and Carol Avenue Parkway Blank hasbeen The Nibs Village Boaed heard 27 that endcd al Shermer Roadthe dispatch andjoined the chase. iuNites. attempl'mgto purchasethe- the mower atits -October 24 and Carol Avenue inNiles. Mulvaneycontinued-alhigh Around 1:30 p.m., the two of- property at 7601 N. Milwaukee meeting, bot tabled their vole The incident bogan in the park- speed fenders exited their moving veN- - Avenar(currently,the Nues until a Public Hearing could be leg lot of the Oleobrook Market Traveling at speeds betweencte al Shermer and Carol and a VillageHall) and establish a -conducted. Place shopping center at Willow65 mph and 70 mph, Mulvoneyfootchaseenssed.
    [Show full text]
  • Regular Expressions in Jlex to Define a Token in Jlex, the User to Associates a Regular Expression with Commands Coded in Java
    Regular Expressions in JLex To define a token in JLex, the user to associates a regular expression with commands coded in Java. When input characters that match a regular expression are read, the corresponding Java code is executed. As a user of JLex you don’t need to tell it how to match tokens; you need only say what you want done when a particular token is matched. Tokens like white space are deleted simply by having their associated command not return anything. Scanning continues until a command with a return in it is executed. The simplest form of regular expression is a single string that matches exactly itself. © CS 536 Spring 2005 109 For example, if {return new Token(sym.If);} If you wish, you can quote the string representing the reserved word ("if"), but since the string contains no delimiters or operators, quoting it is unnecessary. For a regular expression operator, like +, quoting is necessary: "+" {return new Token(sym.Plus);} © CS 536 Spring 2005 110 Character Classes Our specification of the reserved word if, as shown earlier, is incomplete. We don’t (yet) handle upper or mixed- case. To extend our definition, we’ll use a very useful feature of Lex and JLex— character classes. Characters often naturally fall into classes, with all characters in a class treated identically in a token definition. In our definition of identifiers all letters form a class since any of them can be used to form an identifier. Similarly, in a number, any of the ten digit characters can be used. © CS 536 Spring 2005 111 Character classes are delimited by [ and ]; individual characters are listed without any quotation or separators.
    [Show full text]
  • Hollerith Punched Card Code
    ANSI X3.26-1970 ' •> American National Standard Adopled tor Use by the Federal Government Hollerith punched card code FIPS PUB 14 See Nolice on Inside Front Cover 6-1970 3.2 X This standard was approved as a Federal Information Processing Standard by the Office of Management and Budget on June 16, 1971. Details concerning the use of this standard within the Federal Government are contained in FIPS PUB 14, HOLLERITH PUNCHED CARD CODE. For a complete list of the publications available in the FEDERAL INFORMATION PROCESSING STANDARDS Series, write to the Office of Technical Information and Publications, National Bureau of Standards, Washington, D.C. 20234. ANSI X3.26-1970 American National Standard Hollerith Punched Card Code American National Standard This standard is one of approximately 6000 approved as either a USA Standard or as an American Standard. It became an American National Standard in October 1969 when the Institute changed its name to American National Standards Institute, Inc. ANSI, 1430 Broadway, New York, N.Y. 10018 J Sponsor Business Equipment Manufacturers Association Approved January 19, 1970 American National Standards Institute, Inc American National Standard An American National Standard implies a consensus of those sub¬ stantially concerned with its scope and provisions. An American National Standard is intended as a guide to aid the manufacturer, the consumer, and the general public. The existence of an American National Standard does not in any respect preclude anyone, whether he has approved the standard or not, from manufacturing, marketing, purchasing, or using products, processes, or procedures not conforming to the standard. American National Standards are subject to periodic review and users are cautioned to obtain the latest editions.
    [Show full text]