Ordinary Life Office Organization Using a Large-Scale Electronic Computer

1955 ◽  
Vol 81 (3) ◽  
pp. 203-260 ◽  
Author(s):  
A. C. Baker

In a paper on Large-scale Electronic Digital Computing Machines read before the Institute in 1953 (J.I.A. 79, 274) R. L. Michaelson drew the attention of actuaries to the possibilities which existed in a life office for the use of a large-scale electronic digital computer (referred to hereafter as a ‘computer’). Both the paper itself and the discussion which followed emphasized the need for a detailed investigation of the problems involved from the points of view of the life office and the manufacturer.2. The author of this paper has been privileged to undertake, in close cooperation with a large manufacturer of computers in this country, a detailed investigation of possible life-office organization based on a computer. This paper sets down some of the results of this investigation with particular reference to life offices transacting ordinary as distinct from industrial life assurance.

Colossus ◽  
2006 ◽  
Author(s):  
Jack Copeland

The story of the Enigma cipher machine and its defeat by the Bletchley Park codebreakers astounded the world. This book describes Bletchley’s success against a later and more advanced German cipher machine that the British codenamed Tunny (see photograph 28). How Bletchley Park broke Tunny has been a closely guarded secret since the end of the war. Unlike Enigma, which dated from 1923 and was marketed openly throughout Europe, the ultra-secret Tunny was created by scientists of Hitler’s Third Reich for use by the German Wehrmacht. Tunny was technologically more sophisticated than Enigma and—theoretically—more secure. From 1942 Hitler and the German High Command in Berlin relied increasingly on Tunny to protect their communications with Army Group commanders across Europe. The Tunny network carried the highest grade of intelligence. Tunny messages sent by radio were first intercepted by the British in June 1941. After a year-long struggle with the new cipher, Bletchley Park had its first successes against Tunny in 1942. Broken Tunny messages contained intelligence that changed the course of the war, saving an incalculable number of lives. Central to the Bletchley attack on Tunny was Colossus, the world’s first large-scale electronic digital computer. The first Colossus was built during 1943 by Thomas H. Flowers and his team of engineers and wiremen, a tight-knit group who worked in utmost secrecy and at terrific speed. The construction of the machine took them ten months, working day and night, pushing themselves until (as Flowers said) their ‘eyes dropped out’. The racks of complex electronic equipment were transferred from Flowers’ laboratory at Dollis Hill in London to Bletchley Park, where Colossus was reassembled. Despite the fact that no such machine had previously been attempted, the computer was in working order almost straight away and ready to begin its fast-paced attack on the German messages. The name ‘Colossus’ was certainly apt. Colossus was the size of a room and weighed approximately a ton. By the end of the war in Europe there were ten Colossi. The computers were housed in two vast steel-framed buildings—a factory dedicated to breaking Tunny. There are photographs of some of the Colossi in the centre of the book.


1964 ◽  
Vol 29 ◽  
pp. 89-207
Author(s):  
A. D. Wilkie

SynopsisThe paper describes the system used by one office to produce valuation and mortality statistics and to calculate bonus for ordinary assurances, using magnetic tape files and a Pegasus 2 computer.After a brief outline of certain features of the office, the computer, and the previous system using punched cards, some of the factors that influenced the system finally developed are discussed. An outline of the main system is given, and of some of its subsidiary parts.The policy data and movements system is discussed in detail, and some comments are made on the system of checking the data supplied to the computer. The principal routines to calculate the net premium and value the policy are described fully, and flow charts for the routines are appended. The calculations for analysis of surplus are also described in detail. Some features of the programmes peculiar to a computer system are also discussed, and a detailed example given.It is shown how Flexowriter tapes could be used to replace punched cards for the input of data for new policies, and how new business statistics could be obtained. Finally, the possibility of using the computer system for an emerging costs valuation is explored, and some other possible future extensions of the system are discussed.


Author(s):  
M. M. Astrahan ◽  
B. Housman ◽  
J. F. Jacobs ◽  
R. P. Mayer ◽  
W. H. Thomas

1961 ◽  
Vol 16 (03) ◽  
pp. 210-227
Author(s):  
T. B. Boss ◽  
K. H. Allen ◽  
A. C. Baker ◽  
D. W. Brackfield ◽  
R. B. Colbran ◽  
...  

This report summarizes the conclusions reached and difficulties encountered by Group E in the discussions held over the past 4 years. It is thus an amplification and extention of the report made to a meeting of the various computer Study Groups held on 27 May 1957.The Group consists mainly of actuaries employed by ordinary life assurance offices (some composite and some purely life). The Chairman is a member of the Mathematics Division of the National Physical Laboratory, Teddington. The Group has been joined from time to time by representatives of computer manufacturers and other visitors.


2020 ◽  
Vol 23 (4) ◽  
pp. 67-73
Author(s):  
Marina A. Droga ◽  
◽  
Nataliya V. Yurchenko ◽  
Svetlana V. Funikova ◽  
◽  
...  

The problem of onomatopoeias as a special lexical group has existed in the language for many decades. Onomatopoeias imitate the sounds of nature, the language of animals, objects of the surrounding world. In the text, onomatopoeia can perform various functions: emotional influence, imitation, as well as the function of language economy. But one of its main functions remains sound imaging. In Russia and China, different language pictures, specific cultural elements and linguistic features are noted. All this confirms the large-scale differences in the sound imitations of both languages, and in various aspects: in the composition of the components, in the functional role, in the meanings. Despite the fact that the differences in the phonetic system of Russian and Chinese are quite large, the onomatopoeias and their functions in the languages under consideration have the same features. Onomatopes are an expression of the same emotions, feelings, sounds both in oral speech and in writing. Chinese onomatopes are a graphic copy that attributes us to the actual sounding. This fact makes onomatopoeias in Chinese similar to onomatopes in Russian. The connection of sound and meaning is especially important: linguists study the nature of this connection from different points of view. It is also important to note the difference between sound imitations and similar interjections. Onomatopes are not only part of the system of the Russian and Chinese languages, but are also a progressive link that develops the resources of the language, its word-forming capabilities, as well as the expressive sphere of expression.


1953 ◽  
Vol 79 (3) ◽  
pp. 274-322 ◽  
Author(s):  
R. L. Michaelson

In a paper read before the Institute in January 1936, E. W. Phillips discussed developments in computing machines and made the following prediction : If it [the light-ray machine] is provided with all the necessary material on the morning of 1st January, the whole of the valuation will be completed within 15 minutes or so. Indeed when the actuary arrives there will still be time to complete the valuation over again on eight or nine other bases before he goes out to lunch, and yet have ready the figures necessary for the Annual General Meeting in the afternoon.


1966 ◽  
Vol 92 (3) ◽  
pp. 211-252
Author(s):  
J. H. Kitton ◽  
J. M. Beattie

The merger, a few years ago, of two large composite insurance company Groups brought together under one ultimate control three substantial life assurance funds each fully operative and transacting all types of ordinary life assurance and annuity business. Those three funds have now been fused together by the legal transfer of the life businesses of two of the companies in the Group to the parent company and, as this fusion seems to be the first of its kind which has been undertaken for many years, and certainly the first of such size in the life assurance history of Great Britain, it has been suggested that the operation is of sufficient interest to actuaries generally as to warrant the submission of a paper to a sessional meeting. We are, however, conscious of the fact that, whilst the operation may have added to our history as a practical application of the law and some of our principles, it has not added either to previous knowledge or to our technique. The law governing the operation has remained virtually unchanged since the comprehensive review of life company amalgamations by the late K. J. Britt in the paper he submitted to the Institute in April 1931 (J.I.A. 62, 276) and probably the whole of the technical aspects involved have been expounded by Redington in the masterful review of the principles of life office valuations which he submitted in April 1952 (J.I.A. 78, 286).


Sign in / Sign up

Export Citation Format

Share Document