Joint inventorship of computers
Society
The term joint inventorship asks but does not necessarily answer the question, “Who is the true inventor of a computer?” I will try to show how “wrong” inventors are joined, how such improper joinder can be avoided, and its dangers. While the law permits the addition or subtraction of improperly joined inventors, it does not permit the substitution of one set of inventors for another set of inventors. Thus, despite corrective weapons, there are some pitfalls which must be avoided.
Computer programs are patentable
It is not surprising that computer programs are not listed in the patent statutes as one of the categories of patentable invention. When these categories were defined many years ago, computers and computer programs were unknown. Therefore, if computer programs are to be patentable within the framework of existing patent law they must fall within one of the specifically defined categories of processes, machines, manufactures or compositions of matter.
A method for scheduling final examinations to yield a minimal number of student conflicts is described. The “minimization” is achieved by repetitively evaluating a nonlinear set of equations. Imbedded in the process is a random or Monte Carlo selection of assignments. As in such heuristic techniques, the solution may not be optimum and many solutions may be found which yield locally minimal results. Computer programs are described and empirical results given.
An automated data system analysis technique is described. The technique is designed to alleviate some of the principal problems that beset current analysis—large data workloads, long span of time between project inception and system operational date, the lack of explicit directions for conducting data system analysis and using the results, and the lack of a technique to control data system changes throughout its lifetime. The analysis is geared to determining workload, relationships and storage characteristics of documents in the information network automatically.
A method for comparing the internal operating speeds of computers
First, a table of frequencies of various types of operations is prepared based on experience in similar applications or, perhaps, on actual counts if these are available. Table 1 shows such a frequency table. Next, the total weighted execution time for a given operation type is obtained by multiplying the time required for the operation by the frequency count. Finally, an “average” operation time is calculated by summing overall operation types and dividing by the sum of the frequency counts. Table 2 shows the computation for the IBM 7090.
Table 3 shows a comparison of average and relative speeds for several current computers for the particular application using the IBM 7090 as a reference base.
Computer-usage accounting for generalized time-sharing systems
The current development of general time-sharing systems requires a revision of accounting procedures for computer usage. Since time-sharing system users operate concurrently, it is necessary to be more precise as to the amount of computer time and storage space that a user actually utilizes. The various cost factors which should be considered for computer usage accounting in generalized time-sharing systems are discussed.
report on CCITT data communications study group meeting
Data communications was the subject of a two-week meeting held 24 September through 4 October 1963, in Geneva, Switzerland, by the International Telegraph and Telephone Consultative Committee (CCITT) Special Study Group A. Previous meetings of this group had been held in Geneva in April, 1960, and October, 1961. The CCITT has traditionally been responsible for all standardization activities involving the public telecommunications network of the world. Among the 150 participants, there were eleven USA representatives who represented the Government, various business machine companies and the common carriers.
Shape the Future of Computing
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get InvolvedCommunications of the ACM (CACM) is now a fully Open Access publication.
By opening CACM to the world, we hope to increase engagement among the broader computer science community and encourage non-members to discover the rich resources ACM has to offer.
Learn More