The article focuses on designing and development of next generation of application software. programmers at the Academic Computing Department at the Summer Institute of Linguistics in Dallas, Texas, have been building...
详细信息
The article focuses on designing and development of next generation of application software. programmers at the Academic Computing Department at the Summer Institute of Linguistics in Dallas, Texas, have been building a software that would facilitate understanding for the past three years. The result is called CELLAR (Computing Environment for Linguistic, Literary and Anthropological Research). One of the key technologies in CELLAR is a set of fundamental extensions to the object-oriented approach to software development. Having decided what would be necessary for excellent applications support, the designers decided that these things should be implemented in the innermost parts of the system. This makes things like multiple views of information available through an application, at any level of granularity. The resulting architecture uses an extended object model. CELLAR is a marriage of database and document technologies. The underlying implementation of CELLAR supports editing operations on information displayed in views, so that each view defines a structured editor for the object class.
In the September 1997 'Inside Risks,' David Parnas made a compelling case for defining the core body of software knowledge, evaluating the curricula, and licensing software practitioners the same way engineers...
详细信息
In the September 1997 'Inside Risks,' David Parnas made a compelling case for defining the core body of software knowledge, evaluating the curricula, and licensing software practitioners the same way engineers are licensed. A desirable obligation he mentioned beyond basic competence is the ability to pass examinations relating to legal and ethical practice. Most professional organizations have well-documented codes of ethics. However, Parnas observes that whereas professional engineers who do not adhere to their oath can lose their licenses, software professionals have little to lose and may not have heard about such oaths. Unfortunately, excuses such as short-term profits, preservation of corporate image, organizational and peer pressures, secrecy, and perhaps setting low standards in hopes of limiting liability suits for noncompliance are sometimes used as justifications for irresponsible behavior. On the other hand, real potential risks to individuals tend to discourage responsible behavior by people who might otherwise consider becoming whistle-blowers. The ethically inspired act of whistle-blowing might typically involve various aspects, such as being aware of and documenting a serious problem, informing one's superiors, having findings repeatedly rejected and systematically covered up, and being threatened with or subjected to retaliation.
Evaluates the errors of novice programmers on computer programs. Improvement in the quality of programming education; Misconceptions on programming languages; Impact of programming textbooks on computer students.
Evaluates the errors of novice programmers on computer programs. Improvement in the quality of programming education; Misconceptions on programming languages; Impact of programming textbooks on computer students.
Bell Telephone Laboratories' Low-Level Linked List Language L6 (pronounced 'L-six') is a new programming language for list structure manipulations. It contains many of the facilities which underlie such li...
详细信息
Bell Telephone Laboratories' Low-Level Linked List Language L6 (pronounced 'L-six') is a new programming language for list structure manipulations. It contains many of the facilities which underlie such list processors as IPL, LISP, COMIT and SNOBOL, but permits the user to get much closer to machine code in order to write faster-running programs, to use storage more efficiently and to build a wider variety of linked data structures. [ABSTRACT FROM AUTHOR]
Presents a tribute to software programmer Edsger W. Dijkstra, who died in August 2002. Educational qualifications; Turing Award; Study on software developers' careless usage of the Goto statements; Role in the eme...
详细信息
Presents a tribute to software programmer Edsger W. Dijkstra, who died in August 2002. Educational qualifications; Turing Award; Study on software developers' careless usage of the Goto statements; Role in the emergence of the Structured Programming movement; Authorship of five of the 38 most influential papers in computer science.
Reports on the Association for Computing Machinery's (ACM) decision to establish a code of ethics as part of its efforts to establish professionalism among computer programmers. Importance of establishing a collec...
详细信息
Reports on the Association for Computing Machinery's (ACM) decision to establish a code of ethics as part of its efforts to establish professionalism among computer programmers. Importance of establishing a collective code to discipline a collective group; Meaning of ethical behavior in the field of information processing; Other measures planned by the ACM to bring about the transition to a professional status.
computer programming deals with an enormous variety of activities and is carried on by people with a great variety of *** seems clear that part but not all of this activity is evolving toward a distinct professional f...
详细信息
暂无评论