The Dawn of Software Engineering


Book Description

Contrary to what many believe, Alan Turing is not the father of the all-purpose computer. Engineers were, independently of Turing, already building such machines during World War II. Turing's influence was felt more in programming after his death than in computer building during his lifetime. The first person to receive a Turing award was a programmer, not a computer builder. Logicians and programmers recast Turing's notions of machine and universality. Gradually, these recast notions helped programmers to see the bigger picture of what they were accomplishing. Later, problems unsolvable with a computer influenced experienced programmers, including Edsger W. Dijkstra. Dijkstra's pioneering work shows that both unsolvability and aesthetics have practical relevance in software engineering. But to what extent did Dijkstra and others depend on Turing's accomplishments? This book presents a revealing synthesis for the modern software engineer and, by doing so, deromanticizes Turing's role in the history of computing.




The Technical and Social History of Software Engineering


Book Description

Pioneering software engineer Capers Jones has written the first and only definitive history of the entire software engineering industry. Drawing on his extraordinary vantage point as a leading practitioner for several decades, Jones reviews the entire history of IT and software engineering, assesses its impact on society, and previews its future. One decade at a time, Jones assesses emerging trends and companies, winners and losers, new technologies, methods, tools, languages, productivity/quality benchmarks, challenges, risks, professional societies, and more. He quantifies both beneficial and harmful software inventions; accurately estimates the size of both the US and global software industries; and takes on "unexplained mysteries" such as why and how programming languages gain and lose popularity.




Dawn of the New Everything


Book Description

The Microsoft interdisciplinary scientist largely credited with popularizing virtual reality reflects on his lifelong relationship with technology, showing VR's ability to illuminate and amplify our understanding of our species and how the brain and body connect to the world. By the author of You Are Not a Gadget. --Publisher.




The Essential Knuth


Book Description

Donald E. Knuth lived two separate lives in the late 1950s. During daylight he ran down the visible and respectable lane of mathematics. During nighttime, he trod the unpaved road of computer programming and compiler writing. Both roads intersected -- as Knuth discovered while reading Noam Chomsky's book Syntactic Structures on his honeymoon in 1961. "Chomsky's theories fascinated me, because they were mathematical yet they could also be understood with my programmer's intuition. It was very curious because otherwise, as a mathematician, I was doing integrals or maybe was learning about Fermat's number theory, but I wasn't manipulating symbols the way I did when I was writing a compiler. With Chomsky, wow, I was actually doing mathematics and computer science simultaneously." How, when, and why did mathematics and computing converge for Knuth? To what extent did logic and Turing machines appear on his radar screen? The early years of convergence ended with the advent of Structured Programming in the late 1960s. How did that affect his later work on TeX? And what did "structure" come to mean to Knuth? Shedding light on where computer science stands today by investigating Knuth's past -- that's what this booklet is about.




The CERT Guide to Insider Threats


Book Description

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address attacks by all types of malicious insiders, including current and former employees, contractors, business partners, outsourcers, and even cloud-computing vendors. They cover all major types of insider cyber crime: IT sabotage, intellectual property theft, and fraud. For each, they present a crime profile describing how the crime tends to evolve over time, as well as motivations, attack methods, organizational issues, and precursor warnings that could have helped the organization prevent the incident or detect it earlier. Beyond identifying crucial patterns of suspicious behavior, the authors present concrete defensive measures for protecting both systems and data. This book also conveys the big picture of the insider threat problem over time: the complex interactions and unintended consequences of existing policies, practices, technology, insider mindsets, and organizational culture. Most important, it offers actionable recommendations for the entire organization, from executive management and board members to IT, data owners, HR, and legal departments. With this book, you will find out how to Identify hidden signs of insider IT sabotage, theft of sensitive information, and fraud Recognize insider threats throughout the software development life cycle Use advanced threat controls to resist attacks by both technical and nontechnical insiders Increase the effectiveness of existing technical security tools by enhancing rules, configurations, and associated business processes Prepare for unusual insider attacks, including attacks linked to organized crime or the Internet underground By implementing this book’s security practices, you will be incorporating protection mechanisms designed to resist the vast majority of malicious insider attacks.




Patterns of Software


Book Description

In a book that will intrigue anyone who is curious about Silicon Valley, computer programming, or the world of high technology, respected software pioneer and computer scientist Richard Gabriel offers an informative insider's look at the world of software design and computer programming and the business that surrounds them. 10 illustrations.




Making a World of Difference


Book Description

Fifty years ago, the National Academy of Engineering (NAE) was founded by the stroke of a pen when the National Academy of Sciences Council approved the NAE's articles of organization. Making a World of Difference commemorates the NAE anniversary with a collection of essays that highlight the prodigious changes in people's lives that have been created by engineering over the past half century and consider how the future will be similarly shaped. Over the past 50 years, engineering has transformed our lives literally every day, and it will continue to do so going forward, utilizing new capabilities, creating new applications, and providing ever-expanding services to people. The essays of Making a World of Difference discuss the seamless integration of engineering into both our society and our daily lives, and present a vision of what engineering may deliver in the next half century.




The Universal Machine


Book Description

The computer unlike other inventions is universal; you can use a computer for many tasks: writing, composing music, designing buildings, creating movies, inhabiting virtual worlds, communicating... This popular science history isn't just about technology but introduces the pioneers: Babbage, Turing, Apple's Wozniak and Jobs, Bill Gates, Tim Berners-Lee, Mark Zuckerberg. This story is about people and the changes computers have caused. In the future ubiquitous computing, AI, quantum and molecular computing could even make us immortal. The computer has been a radical invention. In less than a single human life computers are transforming economies and societies like no human invention before.




The Soul of A New Machine


Book Description

Tracy Kidder's "riveting" (Washington Post) story of one company's efforts to bring a new microcomputer to market won both the Pulitzer Prize and the National Book Award and has become essential reading for understanding the history of the American tech industry. Computers have changed since 1981, when The Soul of a New Machine first examined the culture of the computer revolution. What has not changed is the feverish pace of the high-tech industry, the go-for-broke approach to business that has caused so many computer companies to win big (or go belly up), and the cult of pursuing mind-bending technological innovations. The Soul of a New Machine is an essential chapter in the history of the machine that revolutionized the world in the twentieth century. "Fascinating...A surprisingly gripping account of people at work." --Wall Street Journal




Verification and Validation in Systems Engineering


Book Description

At the dawn of the 21st century and the information age, communication and c- puting power are becoming ever increasingly available, virtually pervading almost every aspect of modern socio-economical interactions. Consequently, the potential for realizing a signi?cantly greater number of technology-mediated activities has emerged. Indeed, many of our modern activity ?elds are heavily dependant upon various underlying systems and software-intensive platforms. Such technologies are commonly used in everyday activities such as commuting, traf?c control and m- agement, mobile computing, navigation, mobile communication. Thus, the correct function of the forenamed computing systems becomes a major concern. This is all the more important since, in spite of the numerous updates, patches and ?rmware revisions being constantly issued, newly discovered logical bugs in a wide range of modern software platforms (e. g. , operating systems) and software-intensive systems (e. g. , embedded systems) are just as frequently being reported. In addition, many of today’s products and services are presently being deployed in a highly competitive environment wherein a product or service is succeeding in most of the cases thanks to its quality to price ratio for a given set of features. Accordingly, a number of critical aspects have to be considered, such as the ab- ity to pack as many features as needed in a given product or service while c- currently maintaining high quality, reasonable price, and short time -to- market.