000 -LEADER |
fixed length control field |
04377nam a22004815i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20140310151116.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
101029s2011 xxk| s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781849964982 |
|
978-1-84996-498-2 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.C66 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
004 |
Edition number |
23 |
264 #1 - |
-- |
London : |
-- |
Springer London, |
-- |
2011. |
912 ## - |
-- |
ZDB-2-SCS |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Partridge, Derek. |
Relator term |
author. |
245 14 - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Title |
The Seductive Computer |
Medium |
[electronic resource] : |
Remainder of title |
Why IT Systems Always Fail / |
Statement of responsibility, etc |
by Derek Partridge. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
XVI, 323p. 56 illus., 6 illus. in color. |
Other physical details |
online resource. |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Preface -- 1. Introduction -- I The Joy Of Programming -- 2. The Happy Hacker: Love At First Byte -- 3. The Reluctant Programmer -- 4. Cooking Up Programs -- 5. Recipes For What? -- 6. Programs: The Good, The Bad And The Verified -- 7. Going To Ground With Symbols -- 8. Hooptedoodle 1 - The Proof Of The Pudding Is In The Science -- 9. The Soft Machine -- 10. Computers Only Do What You Tell Them To Do -- 11. Hooptedoodle 2 - Recursing Through Tescos -- II The Way Of The Seducer -- 12. Intimate Relationships Of The Computational Kind -- 13. Programming With Flair -- 14. Hooptedoodle 3 - The Seductive Gene -- 15. Runaway Programs - Dr Frankenstein’s Predicament -- 16. Sneakaway Programs - Everybody’s Predicament -- 17. Hooptedoodle 4 - Bases For Data Security -- 18. The Roles Of Software In Society -- III Pieces Of Resistance -- 19. Help From Within -- 20. A Moderately Stupid Assistant -- 21. Watching Programs Work - Support For Voyeurism -- 22. Classical Reconditioning: Doing What Happens Naturally -- 23. A Computer That Knows When It’s Wrong -- IV The End Of The Affair -- 24. Analysis & Counselling -- 25.Epilogic. |
520 ## - SUMMARY, ETC. |
Summary, etc |
IT systems explode budget estimates, bust production deadlines by years, and then fail to work properly. Why this IT-system crisis? Poor programmers? Inadequate project management? No. The Seductive Computer argues that the fundamental nature of programming technology itself is the real culprit; it promises perfection but can only deliver emergent chaos. It is also an insidiously compelling technology, peculiarly male oriented. IT systems, an unavoidable and increasing reality in all our lives, are something new to man - large-scale discrete complexity. The Seductive Computer explains this novelty that defies human understanding. This book illustrates in a simple yet thorough manner the underlying concepts necessary for understanding the IT-system crisis - not ‘How To Program’ but what the demands of programming are. It then proceeds to lay out the full gamut of issues - all stemming from the nature of the technology. From development to maintenance IT-system personnel are grappling with incipient chaos. The technicians are seduced by the detailed challenge of the technology. The scientists are seduced by the promises of their technology. The managers and users are seduced by the mysteries of the technology. No IT system is ever fully understood by anyone, so surprising behaviours will always emerge. What can be done? We must rein in our expectations of IT systems: what they can do, and how reliably they can do it. On the positive side, The Seductive Computer discusses novel paradigms that look beyond the current discrete technology: neural computing and precise approximation computing. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer science. |
|
Topical term or geographic name as entry element |
Software engineering. |
|
Topical term or geographic name as entry element |
Information systems. |
|
Topical term or geographic name as entry element |
Information Systems. |
|
Topical term or geographic name as entry element |
Computer industry. |
|
Topical term or geographic name as entry element |
Computer Science. |
|
Topical term or geographic name as entry element |
Computers and Society. |
|
Topical term or geographic name as entry element |
Management of Computing and Information Systems. |
|
Topical term or geographic name as entry element |
The Computing Profession. |
|
Topical term or geographic name as entry element |
Software Engineering. |
|
Topical term or geographic name as entry element |
Software Engineering/Programming and Operating Systems. |
|
Topical term or geographic name as entry element |
Information Systems Applications (incl.Internet). |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY |
Title |
Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY |
Display text |
Printed edition: |
International Standard Book Number |
9781849964975 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
http://dx.doi.org/10.1007/978-1-84996-498-2 |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
E-Book |