{"title":"Papal visit press center","authors":"William Thorn, Ann Mallinger","doi":"10.1145/62621.62624","DOIUrl":"https://doi.org/10.1145/62621.62624","url":null,"abstract":"When Pope John Paul II visited the United States from September 10 - 19, 1987 the media scramble for information could have overwhelmed the small communication offices of the 9 host dioceses. Marquette University's VAXCluster was used to ease that bottleneck with an innovative experiment, the Papal Visit Computer Press Center.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129646193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interactive vs. procedural modelling in computer-aided design","authors":"C. Tountas","doi":"10.1145/382266.382267","DOIUrl":"https://doi.org/10.1145/382266.382267","url":null,"abstract":"Architects' interest in computer-aided design (CAD) is growing rapidly and most large firms either have or are in the process of acquiring such systems. With the appearance of CAD on microcomputers, smaller firms are also moving in that direction. The driving force varies: fascination with the new technology, expectation of expanded capabilities or greater economy, desire to be current, fear of not being competitive. In architecture, as elsewhere, the inconclusive debates of the past decades on the virtues and vices of automation have proved irrelevant: the machine is creeping in on its own steam, wanted or not, and its momentum is growing.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128888395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can I get there from here? Network nostalgia, nature, and navigation","authors":"Kay Schenk","doi":"10.1145/382266.382430","DOIUrl":"https://doi.org/10.1145/382266.382430","url":null,"abstract":"Computer networks are generally distinguished from decentralized access systems (for instance, early airlines reservations systems) by the type of equipment on the communication line or connection. In computer networks, messages or information is passed from one host machine to another machine or terminal along the network. In a decentralized access system, users in different locations are, in actuality, accessing only one centralized host machine. Almost from the introduction of second-generation timesharing computing equipment in the early 60's, it became apparent that the easy transfer of information between computers would be advantageous. To this end, research into the subject of computer networks began in the late 1960's funded by the U.S. Department of Defense through its Defense Advanced Research Projects Agency. Since the implementation of the first network developed by this agency, tagged ARPANET, computer networking and its implications have had and will continue to have a profound effect on society. You need only watch a few television commercials that introduce you to home computers connected to various networking services such as computerized bill payment, stock market reporting and the like to be convinced of the important role this relatively new technology will play in our lives.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"213 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121092918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Looking at optical disk storage technology","authors":"T. J. Chandler","doi":"10.1145/382266.382429","DOIUrl":"https://doi.org/10.1145/382266.382429","url":null,"abstract":"The field of information science is currently in the midst of another technological revolution --- one that promises to alter our lives in ways yet to be imagined. This revolution is being led by a vanguard of highly collimated electromagnetic radiation; an aggregation more commonly known as a laser beam. This laser beam is being used to store and retrieve data at vastly greater densities and at far greater speeds than today's most sophisticated methods of data storage and retrieval. It is this breakthrough that has given rise to a number of new technological innovations. These innovations are heralding a new era for such diverse fields as educational psychology, computer science and stereophony.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"39 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120876503","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Source code security: a checklist for managers","authors":"Jon Corelis","doi":"10.1145/382266.382431","DOIUrl":"https://doi.org/10.1145/382266.382431","url":null,"abstract":"Although computer security is usually thought of as data security, the protection of the executable software which creates and maintains that data is an equally important aspect of security. This article will describe the general principles for securing source code integrity in the computer services department of a medium to large size organization. It is addressed to the EDP manager, auditor, or user who has primary administrative, rather than technical, responsibility for the security of such code. My treatment of these issues will inevitably reflect my own primary experience of them, which has been with mainframe batch data processing applications. But the underlying principles of source code security are the same for all types of software, whether batch, interactive, or micro. Accordingly, I may hope that my discussion of these problems will be of some use also to those who must manage other types of data processing.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116936474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The scholar in the computing center: dead end or golden opportunity?","authors":"J. Raben","doi":"10.1145/382270.382271","DOIUrl":"https://doi.org/10.1145/382270.382271","url":null,"abstract":"An interesting phenomenon with farreaching consequences for American education (and probably therefore for education around the world) has begun to evolve. More and more academics with excellent credentials--Ph.D.s in subjects like English, history, or archaeology--are begin denied appointments in the departments in which they should be employed. Their inability to obtain appointments may, of course, result simply from the chronic mismatch in American universities between the need for young faculty and the available candidates for such employment. But even while they cannot achieve the type of position they have diligently trained for, these same highly trained specialists are being appointed to a new type of position: humanities computing consultant.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128820954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Horse sense from a horse doctor","authors":"Phil Bushby","doi":"10.1145/382270.382424","DOIUrl":"https://doi.org/10.1145/382270.382424","url":null,"abstract":"Why is a Veterinarian from Mississippi addressing an audience of individuals associated with University Computer Centers? I believe it is because I represent a unique perspective towards higher education. This perspective has come about because of several unique aspects of the Veterinary Program at Mississippi State University. First our organizational structure is different than that of most other colleges or universities. For example, we don't have committees; we don't even use the word committee; we use advisory board. What would be the curriculum committee at other institutions is called the Academic Board in our institution. The Academic Board serves as an advisory group to the Academic Program Director. Now, it is possible, within our administrative structure, for a director of a program to ignore the overwhelming advice of his advisory board and make decisions that are contrary to, perhaps, the unanimous vote of the advisory board. You don't stay a director too long if you do that, but it is possible. Things are not, for the most part, done by committee vote.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122725724","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Computer centres - the next decade","authors":"J. Alty","doi":"10.1145/62630.62636","DOIUrl":"https://doi.org/10.1145/62630.62636","url":null,"abstract":"When trying to predict what will happen in the next decade it is always instructive to step back a decade and see how things have, or have not changed. It is often said that the computing world is a rapidly changing one, and this is certainly true of some key parameters, for example CPU power, store size and reliability. However, we should not be misled into thinking that change has been rapid in all areas. For example, progress in user-friendly interfaces, proof of correctness, and reliable software design techniques has been slow.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125196258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Planning for academic departmental systems","authors":"P. A. Mcclure","doi":"10.1145/382270.382425","DOIUrl":"https://doi.org/10.1145/382270.382425","url":null,"abstract":"I want to describe the computing environment at our campus and how departmental computing fits in, the goals that we envisioned for the departmental planning process, and the process that we have developed over the last two years. I'll also describe the model that we are continuing to develop to assist in the estimation of cost and in the negotiation of funding for departmental systems and show you three brief examples of plans which our academic departments have developed. Finally, I want to share my observations about the strengths and weaknesses of this process.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130325675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Desktop publishing: annotated resource list","authors":"S. Saari","doi":"10.1145/1098842.1098845","DOIUrl":"https://doi.org/10.1145/1098842.1098845","url":null,"abstract":"Magazines that have devoted entire issues or special sections in issues to desktop publishing:MacUser, (June 1986) - Special supplement, Desktop Publishing on the Mac, articles include: introductory article with glossary of terms; how to publish a newsletter; business publishing; LaserWriter fonts; review of PageMaker for Mac; current directory of Mac hardware and software; creating resumes.","PeriodicalId":168438,"journal":{"name":"ACM Siguccs Newsletter","volume":"224 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1987-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127185124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}