Beyond the data processing horizon

ACM '84 Pub Date : 1985-09-01 DOI:10.1145/800171.809657
C. Hammer
{"title":"Beyond the data processing horizon","authors":"C. Hammer","doi":"10.1145/800171.809657","DOIUrl":null,"url":null,"abstract":"The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs.\n These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.","PeriodicalId":218138,"journal":{"name":"ACM '84","volume":"107 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1985-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACM '84","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/800171.809657","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

The transition to the post-industrial society is characterized by the introduction of electronic computer-communication systems whose mind- amplifying powers have made data and information our most precious resource. Realtime services provide knowledge workers with access to powerful information systems, in offices, factories, laboratories, class rooms and even the home. Spectacular hardware progress has been attributed to the “miracle of the chip”. We find such chips at the heart of computers, communication devices, and input/output peripherals with whose help we perform such functions as packet-switched communications, distributed data bases, and computer networking. Powerful software engineering tools brought into existence new and improved programming languages, powerful computer operating systems, and a plethora of applications programs. These advances have also created problems. As the data trail grew, citizens voiced their concern about privacy protection of these data. Computer security and the design of trusted computer bases are expected to stem the rising tide of reported “computer crimes”. Electronic Funds Transfer Systems are used to move astronomical sums of “virtual money” over worldwide networks; “virtual books” and other electronic communications are being read widely and instantaneously without the need for hard copy; mechanical slide rules and mechanical watches have gone the way of the Dodo Bird after being replaced by their electronic offspring. Their is even talk of impending changes in the structures of our institutions as a consequence of the pervasive transfer of this new technology into the hands of everyone.
超出数据处理的范围
向后工业社会过渡的特点是电子计算机通信系统的引入,其放大思维的能力使数据和信息成为我们最宝贵的资源。实时服务为知识工作者提供了在办公室、工厂、实验室、教室甚至家中使用强大信息系统的途径。惊人的硬件进步被归功于“芯片奇迹”。我们在计算机、通信设备和输入/输出外设的核心发现了这样的芯片,它们帮助我们执行诸如分组交换通信、分布式数据库和计算机网络等功能。强大的软件工程工具带来了新的和改进的编程语言,强大的计算机操作系统,以及大量的应用程序。这些进步也带来了问题。随着数据轨迹的增长,公民表达了对这些数据隐私保护的担忧。计算机安全以及可信计算机基地的设计有望遏制不断上升的“计算机犯罪”报告。电子资金转移系统用于在全球网络上转移天文数字的“虚拟货币”;“虚拟图书”和其他电子通讯正在被广泛和即时地阅读,而不需要硬拷贝;机械计算尺和机械表在被电子产品所取代后,已经走上了渡渡鸟的道路。他们甚至谈到,由于这种新技术广泛地转移到每个人手中,我们的机构结构即将发生变化。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信