{"title":"ADEPT-50分时系统","authors":"R. Linde, C. Weissman, C. Fox","doi":"10.1145/1478559.1478564","DOIUrl":null,"url":null,"abstract":"In the past decade, many computer systems intended for operational use by large military and governmental organizations have been \"custom made\" to meet the needs of the particular operational situation for which they were intended. In recent years, however, there has been a growing realization that this design approach is not the best method for long term system development. Rather, the development of general purpose systems has been promoted that provide a broad, general base on which to configure new systems. The concepts of time-sharing and general-purpose data management have been under development for several years, particularly in university or research settings. These methods of computer usage have been tested, evaluated, and refined to the point where today they are ready to be exploited by a broad user community.","PeriodicalId":230827,"journal":{"name":"AFIPS '69 (Fall)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1899-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"The ADEPT-50 time-sharing system\",\"authors\":\"R. Linde, C. Weissman, C. Fox\",\"doi\":\"10.1145/1478559.1478564\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the past decade, many computer systems intended for operational use by large military and governmental organizations have been \\\"custom made\\\" to meet the needs of the particular operational situation for which they were intended. In recent years, however, there has been a growing realization that this design approach is not the best method for long term system development. Rather, the development of general purpose systems has been promoted that provide a broad, general base on which to configure new systems. The concepts of time-sharing and general-purpose data management have been under development for several years, particularly in university or research settings. These methods of computer usage have been tested, evaluated, and refined to the point where today they are ready to be exploited by a broad user community.\",\"PeriodicalId\":230827,\"journal\":{\"name\":\"AFIPS '69 (Fall)\",\"volume\":\"3 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1899-12-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"AFIPS '69 (Fall)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/1478559.1478564\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"AFIPS '69 (Fall)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1478559.1478564","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In the past decade, many computer systems intended for operational use by large military and governmental organizations have been "custom made" to meet the needs of the particular operational situation for which they were intended. In recent years, however, there has been a growing realization that this design approach is not the best method for long term system development. Rather, the development of general purpose systems has been promoted that provide a broad, general base on which to configure new systems. The concepts of time-sharing and general-purpose data management have been under development for several years, particularly in university or research settings. These methods of computer usage have been tested, evaluated, and refined to the point where today they are ready to be exploited by a broad user community.