//]]>

The Seductive Computer (Record no. 21464)

000 -LEADER
fixed length control field 04377nam a22004815i 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20140310151116.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr nn 008mamaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 101029s2011 xxk| s |||| 0|eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781849964982
978-1-84996-498-2
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.C66
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 004
Edition number 23
264 #1 -
-- London :
-- Springer London,
-- 2011.
912 ## -
-- ZDB-2-SCS
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Partridge, Derek.
Relator term author.
245 14 - IMMEDIATE SOURCE OF ACQUISITION NOTE
Title The Seductive Computer
Medium [electronic resource] :
Remainder of title Why IT Systems Always Fail /
Statement of responsibility, etc by Derek Partridge.
300 ## - PHYSICAL DESCRIPTION
Extent XVI, 323p. 56 illus., 6 illus. in color.
Other physical details online resource.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Preface -- 1. Introduction -- I The Joy Of Programming -- 2. The Happy Hacker: Love At First Byte -- 3. The Reluctant Programmer -- 4. Cooking Up Programs -- 5. Recipes For What? -- 6. Programs: The Good, The Bad And The Verified -- 7. Going To Ground With Symbols -- 8. Hooptedoodle 1 - The Proof Of The Pudding Is In The Science -- 9. The Soft Machine -- 10. Computers Only Do What You Tell Them To Do -- 11. Hooptedoodle 2 - Recursing Through Tescos -- II The Way Of The Seducer -- 12. Intimate Relationships Of The Computational Kind -- 13. Programming With Flair -- 14. Hooptedoodle 3 - The Seductive Gene -- 15. Runaway Programs - Dr Frankenstein’s Predicament -- 16. Sneakaway Programs - Everybody’s Predicament -- 17. Hooptedoodle 4 - Bases For Data Security -- 18. The Roles Of Software In Society -- III Pieces Of Resistance -- 19. Help From Within -- 20. A Moderately Stupid Assistant -- 21. Watching Programs Work - Support For Voyeurism -- 22. Classical Reconditioning: Doing What Happens Naturally -- 23. A Computer That Knows When It’s Wrong -- IV The End Of The Affair -- 24. Analysis & Counselling -- 25.Epilogic.
520 ## - SUMMARY, ETC.
Summary, etc IT systems explode budget estimates, bust production deadlines by years, and then fail to work properly. Why this IT-system crisis? Poor programmers? Inadequate project management? No.  The Seductive Computer argues that the fundamental nature of programming technology itself is the real culprit; it promises perfection but can only deliver emergent chaos. It is also an insidiously compelling technology, peculiarly male oriented.  IT systems, an unavoidable and increasing reality in all our lives, are something new to man - large-scale discrete complexity. The Seductive Computer explains this novelty that defies human understanding.  This book illustrates in a simple yet thorough manner the underlying concepts necessary for understanding the IT-system crisis - not ‘How To Program’ but what the demands of programming are. It then proceeds to lay out the full gamut of issues - all stemming from the nature of the technology.  From development to maintenance IT-system personnel are grappling with incipient chaos. The technicians are seduced by the detailed challenge of the technology. The scientists are seduced by the promises of their technology. The managers and users are seduced by the mysteries of the technology. No IT system is ever fully understood by anyone, so surprising behaviours will always emerge.  What can be done? We must rein in our expectations of IT systems: what they can do, and how reliably they can do it. On the positive side, The Seductive Computer discusses novel paradigms that look beyond the current discrete technology: neural computing and precise approximation computing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer science.
Topical term or geographic name as entry element Software engineering.
Topical term or geographic name as entry element Information systems.
Topical term or geographic name as entry element Information Systems.
Topical term or geographic name as entry element Computer industry.
Topical term or geographic name as entry element Computer Science.
Topical term or geographic name as entry element Computers and Society.
Topical term or geographic name as entry element Management of Computing and Information Systems.
Topical term or geographic name as entry element The Computing Profession.
Topical term or geographic name as entry element Software Engineering.
Topical term or geographic name as entry element Software Engineering/Programming and Operating Systems.
Topical term or geographic name as entry element Information Systems Applications (incl.Internet).
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element SpringerLink (Online service)
773 0# - HOST ITEM ENTRY
Title Springer eBooks
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Display text Printed edition:
International Standard Book Number 9781849964975
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-1-84996-498-2
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type E-Book
Copies
Price effective from Permanent location Date last seen Not for loan Date acquired Source of classification or shelving scheme Koha item type Damaged status Lost status Withdrawn status Current location Full call number
2014-04-10AUM Main Library2014-04-10 2014-04-10 E-Book   AUM Main Library004