system hardware - IEEE Computer Society Atari, etc.-canread the signature ... operating system....

5
Editor: Richard Eckhouse Moco, Incorporated 5 Champlain Drive _ Hudson, MA 01749 For more information, circle the appropriate RS No. on the Reader Service Card at the back of the magazine. Hardware device thwarts unauthorized copying Designed to prevent unauthorized copying of computer programs, Securi- key is offered by Software Security Systems, Inc. Securikey is a small, straight or L-shaped device that must be inserted into the computer prior to ac- cessing the program. According to the company, Securikey is transparent to unprotected operations, including diagnostics. The degree. and depth of security checking is specified by the software manufacturer. Two methods, usable together or separately, may be utilized: logic sequence or serial number checking. In logic sequence checking, a series of anticipated logic responses are necessary for each interrogation sequence. If incor- rect responses are received, prediction er- rors are generated, and program opera- tions terminate. In serial number checking, a 32-bit serial number is encoded into each device. The associated software program has a corresponding serial number. These numbers must match for the pro- gram to be executed. This allows a positive means of tracking unauthorized software copying and other associated violations of nondisclosure and license agreements. Reader Service Number 21 Hybrid protection system is hardware independent Filesafe, a hybrid security system con- sisting of a lock that resides in the soft- ware and a hardware code dispenser that allows a user to unlock the software, has been announced by Enigma Logic. The hardware-independent system is compatible with mainframes, minicom- puters, and microcomputers, and pro- tects software or data on all types of media from punched cards to hard disk and bubble. It is carried with the end- user like an electronic set of keys. Two Filesafe products are being in- troduced: Software Lock for program code and Data Lock for data files. Software Lock allows metered use of software for prepurchase trial evaluation and metered site licensing of software. Making backup copies of software and sharing them with associates is en- couraged. Authors and publishers are paid for actual use, according to Enigma Logic. Data Lock allows protection of data files in storage on all types of media, dur- ing modem transmission, and in net- worked environments. Reader Service Number 22 Magnetic signature is key to copy protection Formaster's copy protection device, Copylock, is offered in two forms- standard or custom for developmental protection. Copylock involves a special magnetic signature on the diskette that can be writ- ten only by a Formaster duplicator. The target computer-IBM PC, Commo- dore, Atari, etc.-can read the signature with the help of a special code but can- not write it. Files on a diskette protected by Copylock cannot be copied. The enhanced Copylock, available this summer, will employ a sophisticated en- cryption system using the Data Encryp- tion Standard published by the National Bureau of Standards. Advanced Copylock will utilize an ex- panded software hiding technique that, Formaster states, will make the protec- tion instruction virtually impossible to locate within the program through the use of one-way compilers. Reader Service Number 20 2 ORIGINAL SOURCE O FINAL CopyLock PROTECTED COPIES FORMASTER DISKETTE DUPLICATOR (SERIES or III Foremaster's Copylock software protection involves two processes: source modifica- tion and diskette duplication. IEEE SOFTWARE 100

Transcript of system hardware - IEEE Computer Society Atari, etc.-canread the signature ... operating system....

Editor: Richard EckhouseMoco, Incorporated

5 Champlain Drive

_ Hudson, MA 01749

For more information, circle the appropriate RS No. on the Reader Service Card at the back of the magazine.

Hardware device thwarts unauthorized copyingDesigned to prevent unauthorized

copying of computer programs, Securi-key is offered by Software SecuritySystems, Inc. Securikey is a small,straight or L-shaped device that must beinserted into the computer prior to ac-cessing the program.According to the company, Securikey

is transparent to unprotected operations,including diagnostics. The degree. anddepth of security checking is specified

by the software manufacturer. Twomethods, usable together or separately,may be utilized: logic sequence or serialnumber checking.

In logic sequence checking, a series ofanticipated logic responses are necessaryfor each interrogation sequence. If incor-rect responses are received, prediction er-rors are generated, and program opera-tions terminate.

In serial number checking, a 32-bitserial number is encoded into eachdevice. The associated software programhas a corresponding serial number.These numbers must match for the pro-gram to be executed. This allows apositive means of tracking unauthorizedsoftware copying and other associatedviolations of nondisclosure and licenseagreements.

Reader Service Number 21

Hybrid protection system is hardware independentFilesafe, a hybrid security system con-

sisting of a lock that resides in the soft-ware and a hardware code dispenser thatallows a user to unlock the software, hasbeen announced by Enigma Logic.The hardware-independent system is

compatible with mainframes, minicom-puters, and microcomputers, and pro-tects software or data on all types ofmedia from punched cards to hard disk

and bubble. It is carried with the end-user like an electronic set of keys.Two Filesafe products are being in-

troduced: Software Lock for programcode and Data Lock for data files.

Software Lock allows metered use ofsoftware for prepurchase trial evaluationand metered site licensing of software.Making backup copies of software and

sharing them with associates is en-couraged. Authors and publishers arepaid for actual use, according to EnigmaLogic.

Data Lock allows protection of datafiles in storage on all types of media, dur-ing modem transmission, and in net-worked environments.

Reader Service Number 22

Magnetic signature is keyto copy protection

Formaster's copy protection device,Copylock, is offered in two forms-standard or custom for developmentalprotection.

Copylock involves a special magneticsignature on the diskette that can be writ-ten only by a Formaster duplicator. Thetarget computer-IBM PC, Commo-dore, Atari, etc.-can read the signaturewith the help of a special code but can-not write it. Files on a diskette protectedby Copylock cannot be copied.The enhanced Copylock, available this

summer, will employ a sophisticated en-

cryption system using the Data Encryp-tion Standard published by the NationalBureau of Standards.Advanced Copylock will utilize an ex-

panded software hiding technique that,Formaster states, will make the protec-tion instruction virtually impossible tolocate within the program through theuse of one-way compilers.

Reader Service Number 20

2ORIGINAL SOURCE

O

FINAL CopyLockPROTECTED COPIES FORMASTER

DISKETTE DUPLICATOR (SERIES or III

Foremaster's Copylock software protection involves two processes: source modifica-tion and diskette duplication.

IEEE SOFTWARE100

Fingerprinted diskettesprevent unauthorizedcopying of programs, files

Three products from Vault Corpora-tion-Prolok, Filelok, and Telelok-protect software from unauthorizedduplication without tying the user to aspecific machine. Protection is based ona permanent "fingerprint" etched ontothe surface of the diskette. An encryp-tion program reads the fingerprint anduses it to encrypt the files or programsresiding on the disk.When the software is used, the system

looks for the fingerprint and, if it isfound, unlocks the file and allows it tobe used normally. If the fingerprint is notfound, the user can only access the en-crypted version of the file or program.Since the fingerprint is a physical part ofthe disk, it cannot be copied, even by theengineers who made it, according toVault.Backup copies of the program can be

made with the normal copying process,and the programs can be run on harddisks without interference.

Vault's Prolock software protectiondisk prevents unauthorized copying ofcommercial software packages or pro-prietary programs. Filelok protects datafiles ranging from letters in word pro-cessors to financial records in main-frames. Telelok, designed for modem-to-modem transmission, uses a masterdiskette to encrypt the file and send it toa fingerprinted remote diskette.The fingerprinted diskettes are

adapted to work with all major micro-computer systems and are currently be-ing licensed to publishers. According toVault, etching the fingerprint adds adollar or less to the normal price of thediskette.

Reader Service Number 23

Software packages iaid researchersThe Institute for Scientific Informa-

tion has developed two software pack-ages aimed at the scientific research com-munity. The software is designed to in-tegrate on-line searching with off-lineprocessing so that a scientist can incor-porate reference data into his own filemanagement system.The Sci-Mate Personal Text Manager

allows personal computer owners tocreate their own "mini-database" with aflexible file that can assimilate textual in-formation such as jotted research notes,abstracts, bibliographical citations, andreprint file headings. The program facili-tates a file search by character, word, orphrase, so the scientist can catalog andcross-reference information according towhatever system fits his way of working.The text manager features random ac-

cess storage and a menu-driven com-mand system with a tutorial subsystem.It can store one to 1900 characters perrecord with no pre-indexing or keywordsfor loading data. The flexible recordlayout permits user-definition of up to 20fields per record and tailoring of recordsto the particular specifications. The textmanager offers the option of creating 64

unique files with 32,000 records per fileand provides immediate record updates.The second product, the Sci-Mate

Universal On-line Searcher, enablessearching five major host systems-SDC,Dialog, BRS, NLM, and ISI-that con-tain over 300 databases. With thesearcher, these databases can be accessedthrough an English language menu orthrough the host system's language.The searcher also features automatic

dial-up and log-on and can access otheron-line host systems such as Dow Jones,Source, Compuserve, and Minet (for-merly AMA/GTE).

Sci-Mate is available for the IBM PCor XT, the Wang PC, the Apple II, 11+,or Ile, and the Vector 3 or 4 on 5 ¼/4-inchdiskettes. It is also available for TRS-80Models II and 12, and for other CP/M80 systems with standard 8-inch diskdrives.The Sci-Mate Text Manager costs

$540. The Universal On-line Searcher is$440. If both are purchased at the sametime, the cost is $880. ISI operates a Sci-Mate hotline to deal with unforeseenproblems in using the programs.

Reader Service Number 25

Software aids corporate professionalsPro Computing's new integrated soft-

ware package for corporate profes-sionals, Propel, is useful for telephoneand written communications and num-ber processing.The business professionals can use

Propel to send and receive voice mes-sages or data over the telephone; prepareletters, memos, and reports; fi'le andretrieve notes about meetings, phonecalls, and outside readings; analyzenumerical data presented in tables,graphics, and spreadsheets; and maintain

Lock-It-Up protects IBM PCs and compatiblesDouble-Gold Software has introduced

Lock-It-Up copy protection for the IBMpersonal computer and compatibles. Ac-cording to Double Gold, the menu-driven diskette copy-protection andduplication utility features several levelsof protection that render standarddiskettes virtually uncopyable, even bysuch sophisticated pirating methods asthe current version of Copy II PC.The IBM version of Lock-It-Up pro-

tects diskettes that run under the DOSoperating system. Protected programsmay be uploaded to a hard-disk drive.The protection takes 4K of memory anduses one track of the disk for protectionverilfication. The protection code is easilyadded to any program.

Dupliction time including completeverification of data, is 0.6 seconds pertrack (single sided) or 1.2 seconds pertrack (double sided).

System requirements are IBM PC orcompatible, 128K or more memory, twoor more 40-track disk drives, and DOSoperating system.

Double-Gold is also offering customPC-Lock diskettes containing a soft-ware-implemented protection code thatcannot be written using an IBM PC. Itdoes not physically modify the diskette.

Lock-It-Up systems start at $295; PC-Lock diskettes are $4.95 each in quan-tities of 100.

Reader Service Number 24

lists of phone numbers, things to do, ap-pointments, and prospects.

Initially, Propel will operate on DigitalEquipment Corporation's Professional350 microcomputer. Propel can makethe Pro 350 emulate other Digital andIBM terminals for communicating withmainframe computers.

Dedicated function keys, simple menuhierarchies, and single-key-stroke com-mands provide the inexperienced userwith alternate forms of access to allsystem features. Applications are prefor-matted to look familiar to the user.There is on-screen prompting for everymenu option and a menu "trail" thattraces the user's position in the menuhierarchy. The HELP key providescontext-specific assistance.

Propel can operate at four differentlevels of sophistication. Each successivelevel makes more features available forcustomizing applications, with ap-propriate prompts and help at each level.

Pro Computing provides training-four hours of introductory training aswell as an interactive computer-basedtraining package with an exampledatabase. Advanced, on-site seminarsand an 800-number hotline are availableto users.

Propel's price at minimum order levelsin $1195 with phone applications, $950without.

Reader Service Number 26

April 1984 101

Modula-2 compiler for Vax-VMS generates native object codeA Modula-2 compiler for the DEC Vax

family of computers under the VMS op-erating system is now available fromLogitech. The compiler is a full imple-mentation of Modula-2, a general pur-pose programming language with systemsprogramming capabilities.

The compiler generates Vax native ob-ject code. Separately compiled Modula-2modules are linked with the Vax/VMSlinker. The Vax/VMS symbolic debuggercan be used to debug Modula-2 pro-grams. All debugger commands are avail-able, including examination of variables,

Software offers access to electronic librariesPersonal-computer users can obtain

electronically stored information with In-Search, a new software program fromMenlo Corp. The program allows usersof IBM, Texas Instruments, and IBM-compatible personal computers such asCompaq, Eagle, Columbia, and Coronato access electronic public-informationlibraries offered by Dialog InformationServices, Inc.

Dialog's 200 on-line databases containmore than 80 million references fromnewspapers, magazines, journals, direc-tories, and news services.

In-Search connects to these databasesthrough the use of a modem. Once con-nection, which requires only one key-stroke, is established, In-Search guidesusers through searches with on-screen

graphics, extensive help commands, andbuilt-in database descriptions.Without In-Search, accessing Dialog

involves manual entry of codes, pass-words, and phone numbers-a technical,time-consuming process, according toMenlo. Setting up search strategies anddetermining which databases to lookthrough are also difficult.

In-Search requires an IBM, IBM-compatible, or Texas Instruments per-sonal computer, two double-sidedfloppy-disk drives or one floppy and onefixed-disk drive, 192K bytes of memoryand a Hayes or Novation modem.

In-Search is available at a list price of$399.

Reader Service Number 27

setting of breakpoints, and steppingthrough the program line by line.The compiler provides some special

features that are specific to the Vax/VMSenvironment. For example, it offers fourdifferent floating data types: byte (8 bit),shortword (16 bit), quadword (64 bit),and octaword (128 bit). Through so-called foreign definition modules, it pro-vides access to routines written in otherlanguages. Examples are VMS operatingsystem services and runtime library pro-cedures.The compiler, which is delivered on

standard 9-track 1600-bpi tape, includesthe executable files of the compiler andthe definition source, object, and symbolfiles of a set of standard modules andutilities, including a Modula-2 prettyprinter.

Also included are all source and sym-bol files of a set of foreign definitionmodules, a command language defini-tion file, a help file, and a set of docu-ments (user's guide, Programming inModula-2 by Niklaus Wirth, and instruc-tions for installing the compiler).

The price for a single computer li-cense, $1500 per year, includes 90 days ofmaintenance. Additional maintenance isavailable at $300 per year.

Reader Service Number 28

Menlo Corporation's In-Search software allows immediate access to over 200 on-linedatabases. The package includes a system disk, tutorial program disk, function keytemplates, reference manual, and four category diskettes-art and social sciences;business, government, and news; engineering, mathematics, and physical science; andbiology and medicine.

Conversion systemtransfers data betweenincompatible disks

Altertext's screen-based disk-conver-sion system transfers data between dif-ferent makes of personal computers,word processors, and typesetting equip-ment whose data disks are otherwise in-compatible. It transfers stored data in ex-actly the same format at the original.The Altertext System I and System 11

are stand-alone microcomputer systemsthat can read and write both 8-inch and51/4-inch floppy diskettes from a widevariety of word and data processingequipment.

System I reads floppy disks andtransmits files on line to a front-endsystem, computer, or word processor. Itcan also retrieve information via tele-phone lines and write it onto a floppydisk. Prices begin at $12,000.

System 11 is configured for users in-terested in disk-to-disk capabilities-conversions which read a floppy diskcreated on one system and write a diskcompatible with another. System 11prices start at $20,000.

Reader Service Number 29

IEEE SOFTWARE102

English language option simplifies database useA conversational language inquiry op-

tion-called CLIO-has been intro-duced by Microrim, a database softwarecompany. Designed for use with theR:base Series 4000, Microrim's relationaldatabase management system for per-sonal computers, CLIO enables the userto query the database in his own lan-guage.

Specifically, CLIO allows the user tobuild a dictionary of synonyms for wordsor operations associated with a database.When the user queries the computer withwords not alre-ady in the databasevocabulary, CLIO responds with ques-tions directing the user to define the un-familiar terms. For example, if thedatabase includes a field of data entitled"jobs," the user could construct adefinition for "occupation" or "work"to mean the same thing. All three wordsthen would become interchangeablewhen the database is queried about jobs.CLIO is also able to search the

database to retrieve records based on ad-jectives or qualifying terms. Thus, the

Micro-to-Mainframe Link usesArtificial Intelligence Corporation,

developers of Intellect-an English lan-guage software product-is marketingthe Intellect Micro-to-Mainframe Link.

Users will be able to request informa-tion from their mainframe in English,download it to their IBM PC, and mergethe data into an application package forfurther manipulation and display. TheMicro-to-Mainframe Link allows usersof IBM and compatible PCs to access,retrieve, and display information resi-dent on their mainframe-all in conver-sational English. Mainframe data storedunder all Intellect-supported DBMSs-including IBM's SQL/DS and VSAM,Cullinet's IDMS, Software AG'sAdabas, and IC's DFAM-can be ac-cessed.

In addition, Intellect acts as a front-end supervisor to popular database,statistical analysis, graphics, and spread-sheet packages currently available forIBM and compatible personal com-puters. With the supervisor, the resultsof a query can be downloaded into aspreadsheet or graph in a single opera-tion.The product also features terminal

emulation to an IBM host system run-ning VM/CMS or TSO via asynchronousor coax connection, and file-, record-,and field-level security of mainframedata.The Micro-to-Mainframe Link re-

quires Intellect running under VM/CMSor TSO for mainframe query, the main-

user could ask the database for "a list ofthe top three salesmen in orders for1983." Or, the user could ask the data-base to "list all employees who haveabove averge salaries" followed by"what are their birthdates?"CLIO allows the user to define words

that are the result of computation ordata manipulation. For example, if auser needs to determine the profit or aparticular period when "profit" is not aterm in the database, the user- woulddefine "profit" as "sales minus ex-penses" (where sales and expenses arelocated in many different parts of thedatabase) to arrive at the answer.A special feature of CLIO is its ability

to make simultaneous inquiries into fivedifferent files from the 40 files availableconcurrently in R:base.

Requiring 256K bytes of memory,R:base operates on PC-DOS, MS-DOS,CTOS, BTOS, and Unix. The interfacewill sell for less than $200. R:base ispriced at $495.

Reader Service Number 30

conversational Englishframe-to-micro software option, anasynchronous RS-232 connection or acoax connection to a 3274 controller.The IBM PC or PC compatible must beequipped with at least 256K RAM, andconcurrent CP/M-86 or PC-DOS. Addi-tionally, the PC requires AIC's micro-to-mainframe software option andmicrocomputer software including GSXand selected spreadsheet programs.

Deliveries are scheduled to begin in thethird quarter of 1984. The host Micro-to-Mainframe Link is available for $17,500,including the mainframe communica-tions module and software packages tolink 10 personal computers to the main-frame. Additional packages are availableat $250.

Reader Service Number 31

Intelligent databasemachines integrateinformation management

Britton Lee designs, manufactures,and markets a line of intelligent databasemachines for integrated informationmanagement aimed at OEMs and largeend-users.

Every integrated information manage-ment system centers upon at least one in-telligent database machine. A special-ized, dedicated computer, the IDM isdesigned to run sophisticated, pro-prietary, relational database software.The company claims that the IDM is ableto achieve considerable improvements inretrieval speeds over any conventionalDBMS running on any general-purposehost computer.

At Comdex in November, Britton Leedemonstrated the ability of the IDM tohandle a real-world database containing15 million records (the city of Houston'sreal estate title listings).

Connecting directly to host computersor through networks, the IDM systemprovides complete database managementservices under the direction of existinghost computers.

The IDM acts as a back-end processorto the complete range of general-purposecomputers, from mainframe to micro.Specifically designed with a multiple pro-cessor architecture for optimal perfor-mance of data search and retrieval opera-tions, the IDM effects a division of laborbetween a general-purpose host com-puter and the specialized back-end pro-cessor.

Britton Lee provides a full line of soft-ware to support the IDM. The company

also offers a complete range of softwaretools to provide independent softwareorganizations and end-users with thenecessary aids for implementing com-

plete database applications.Reader Service Number 32

Strategic planning tool automates BSP reportsDatabase Design has announced the

fall release of Information Planner, asoftware modeling tool for strategicinformation systems planning that auto-mates BSP record keeping and reportproduction.

Information Planner is a full-screen,interactive tool for entering, analyzing,and reporting objectives, problems,processes, organizational structure, datafiles, systems, and major systems projectareas, as well as the relationships amongthese elements that underlie all standardBSP reports.

The BSP model is stored in an ency-clopedia, which also contains categoriesuseful in extending the model. Thispermits planners to capture the addi-tional detail necessary to specifymanageable database and applicationdevelopment projects.

In addition to automating IBM's BSP,Information Planner supports the criticalsuccess factors planning approach andJames Martin's strategic data planningmethod.

Reader Service Number 33

April 1984 103

on-line program generator produces multiple screensFlagstaff Software's Screen-Dynamics

is an on-line program generator for theBurroughs B1000/B5000/B6000 series ofcomputers. The package allows pro-grammers to create executable Cobol on-line programs faster than hand coding,the company states.

Screen-Dynamics produces on-lineprograms incorporating multiple screensin various hierarchies of design. It isavailable in either Cobol 68 or Cobol 74.

Troubleshooting servicegives instant hotline helpBy calling a secret access code, per-

sonal computer owners-using all kindsof programs, computers, and operatingsystems-can obtain immediate technicaland applications assistance.

This software support service, calledMayday, is available from Teletech Serv-ice Corporation. According to Teletech,Mayday provides users with expertise onmore than 300 packages and operatingsystems-including dBasell, Wordstar,Lotus 1-2-3, CP/M, and MS/DOS-running on 30 top machines.Mayday is also the name of the com-

pany's computer user's guide, with its in-depth software troubleshooting index.Problems not solvable with the index canbe referred to Mayday's representatives,who are accessible 18 hours a day, sixdays a week. The support representativereferences the query against similarqueries on record, recreates the problem,and solves it.Mayday owners have direct telephone

access to 120 minutes of consultation.Teletech guarantees solutions to Maydaysubscribers.

Reader Service Number 34

The generator requires no specialcoding skills or training, according to thecompany. The programmer paints screenformats on the CRT screen, specifyinghierarchical relationships and programparameters.The one-time charge for Screen-

Dynamics is $750, which includes alldocumentation.

Reader Service Number 35

User's network availablethrough computer retailers

Telesun Corporation has announcedan authorized subscription outlet planthat will allow computer retailers todemonstrate and sell subscriptions to thecompany's Software User's Network.The company recently added several

hundred programs to the network; near-ly 1000 programs are currently availableto subscribers on a per-use or monthlyrental basis. Subscribers are charged by amajor credit card. Royalties are paiddirectly to the producer or author.

Telesun's piracy protection processprevents illegal duplication of the soft-ware. Once the program has beenunlocked and begins running, it can beused as long as the subscriber leaves it inmemory, but any attempt to save theprogram, exit to the operating system, orrun another program renders it unusableand requires another connection.The network currently supports IBM,

Apple, and Radio Shack microcom-puters, and Telesun has announced theaddition of support for the HP150,Commodore 64, and NCR personal com-puter.

Reader Service Number 36

Locator service listssoftware options

Sofsearch International's softwarelocator service provides custom reportson software products available to meetspecific user needs. The service uses up-to-date information on over 35,000 soft-ware products from over 13,000 softwareproducers. According to Sofsearch, itscoverage is universal, addressing all typesof application and system/utility soft-ware packages for all micro, mini, andmainframe computer systems.

Products are classified for user selec-tion according to a proprietary system of120 application and 30 system/utilitycategories for over 1000 operating en-vironments and over 95 industry/activityareas. The Sofsearch User's Guide pro-vides detailed descriptions on softwareselection and evaluation. It offers ideasfor expanding system capabilities, whilesimplifying definition of needs and soft-ware search requirements. Searches can

be performed for specific computersystems or for entire system ranges.Each Sofsearch product report page

provides the software name, produceraddress and contact, functional type, in-dustries/activities served, CPU/opera-ting system and memory requirements,source language, number of users, andcost.The annual service fee is $30, plus $25

or $35 per search request. Service usersreceive the User's Guide, a user accessnumber, the quarterly Sofsearch newslet-ter, semiannual software market surveys,

and discounts on software products pur-chased directly from the vendor.

Reader Service Number 37

Expert system generatoroffered for IBM PC

Expert-Ease, an expert-system genera-

tor from Expert Systems, Inc., bringsproblem-solving, decision-making, anddiagnostic capabilities to IBM PC users.

Expert-Ease can codify any discipline,decision process, or set of rules, policies,or procedures where decisions are notmade at random. The program works byfinding patterns in examples given to it.Reduced to its barest elements, it is a

standard search-tree algorithm designedto collect data about new examples to see

if they match prior examples.All commands are on the screen at all

times, in simple English, and operatewith a single keystroke. Help screens anda user manual come with Expert-Ease.

Expert-Ease is available for a no-

obligation, 15- or 30-day trial. Purchaseprice is $2000.

Reader Service Number 38

IEEE SOFTWARE104