ACM forum: letters

Time Flies Like an Issue I am writing to complain about a flagrant intrusion into my weekend time. For most of the eight years that I have been an ACM member, Communications of the ACM was something that deserved about a 30-second glance each month. In the past few months, however, you have actually been filling the magazine with articles that are worth reading by practicing computer professionals. In particular, I must cite the Oc-tober 1983 issue, especially the article "The Management of End-User Computing" by John F. Rockart and Lauren S. Flannery. Seriously, I must compliment you on the tremendous improvement in the publication from the point of view of those of us who earn our living in the computing craft. Keep up the good work. Hacking Away Communications regrets that, through typographical error, Ronald Thisted appeared to take an Orwellian stance against software privacy in his letter in the January Forum. In the second and third paragraphs, respectively , the offending sentences should read "Untouched on in most discussions of this matter is the related issue of software piracy, wherein I detect the roots of the 'whiz kids' ethical stance." and "This is not to say that software piracy is morally permissible; in most circumstances I believe it is not." We trust no similar unintentional distortions appear in the following three letters and response to one.-Ed. I do not believe in absolute property rights. I consider it contrary to the public interest , as well as my own, to leave my car overnight on a public street with the ignition key in the switch. Stallman apparently does just this in order to allow teenagers to gain valuable experience operating an automobile (this is what most joyriders want, and why so many of them stop stealing cars when they get their own). Stallman briefly recognizes two legitimate areas for security. He recommends storing personnel records on a dedicated microcomputer, and except "banks and such" from his opinion that computer security is a disease, I believe that some level of security is appropriate in the vast majority of multiple-user computer systems, not the small minority that Stallman's letter implies. Response: Borrowing cars and borrowing computer access are separate moral issues about which a person can reach different conclusions. Here are some factors that affect one's conclusions about cars: (1) Using a car involves moving it. It becomes inaccessible to its …

[1]  J.L. Smith,et al.  Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.

[2]  A. M. Turing,et al.  Computing Machinery and Intelligence , 1950, The Philosophy of Artificial Intelligence.

[3]  Myron Tribus The engineer: The engineer and public policy-making: Like a gladiator with one arm bound behind him, the engineer enters the public arena handicapped by personality and training , 1978, IEEE Spectrum.

[4]  H. Feistel Cryptography and Computer Privacy , 1973 .

[5]  Francis Crick,et al.  The function of dream sleep , 1983, Nature.

[6]  Robert M. Aiken,et al.  A modern Curriculum for an ancient culture , 1982, SIGCSE '82.

[7]  Edsger W. Dijkstra,et al.  Letters to the editor: go to statement considered harmful , 1968, CACM.

[8]  W. C. Hittinger Metal-Oxide-Semiconductor Technology , 1973 .

[9]  Edsger W. Dijkstra,et al.  Guarded commands, nondeterminacy and formal derivation of programs , 1975, Commun. ACM.

[10]  S. G. Axline,et al.  An artificial intelligence program to advise physicians regarding antimicrobial therapy. , 1973, Computers and biomedical research, an international journal.

[11]  Allen Newell,et al.  STUDIES IN PROBLEM SOLVING: SUBJECT 3 ON THE CRYPT-ARITHMETIC TASK DONALD + GERALD = ROBERT, , 1967 .

[12]  Brian A. Wichmann Is Ada too big? A designer answers the critics , 1984, CACM.

[13]  Lawrence Clark,et al.  A linguistic contribution to GOTO-less programming , 1984, CACM.

[14]  Donald A. Waterman,et al.  Generalization Learning Techniques for Automating the Learning of Heuristics , 1970, Artif. Intell..

[15]  H A Simon,et al.  Discovery, invention, and development: human creative thinking. , 1983, Proceedings of the National Academy of Sciences of the United States of America.

[16]  Peter J. Denning,et al.  A nation at risk: the imperative for educational reform , 1983, CACM.

[17]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[18]  Thomas A. D'Auria ACM's visit to the People's Republic of China , 1984, CACM.