Access Restriction

Author Logan, William A.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Once an installation has determined that it would be advantageous to be able to internally identify the contents of each reel of tape on hand and to be able to check those identifications by programming, consideration is given to a Tape. Labeling Routine. The parameters of such a routine are limited only by the inventiveness of the programmers of the installation as they request (and frequently demand) that the label on the tape contain block counts, can numbers, pass tallies, messages, reminders, first names, last names, number of tape inches available, security classifications, unit the tape is to be mounted on, and hundreds of other “necessary” pieces of data which will serve to illustrate the complexity of data processing. The routine which is to translate these labels is oftentimes encumbered with brilliant formulas which enable it (if it can ever be completely debugged) to manipulate the information and make decisions of astounding magnitude. What little core memory space remains is then used to process the data in the file which the label identified.
Description Affiliation: Burroughs Corp., Pasadena CA (Logan, William A.)
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 3
Issue Number 2
Page Count 2
Starting Page 85
Ending Page 86

Open content in new tab

   Open content in new tab
Source: ACM Digital Library