We have arbitrarily selected a large body of professionally produced code and subjected it to 'stylistic analysis.' It has not been our intention to criticize the code, nor do we expect the statistics derived ...
详细信息
We have arbitrarily selected a large body of professionally produced code and subjected it to 'stylistic analysis.' It has not been our intention to criticize the code, nor do we expect the statistics derived to be an assertion of the elegance, or lack thereof, of any of the constituent programs. So many features affect the 'style' of a program-the language, its history, the number of authors, etc.-that we hope, first, to have drawn attention to an area we believe worthy of further discussion and, second, to have presented some tools and techniques that provide a basis for such discussion. [ABSTRACT FROM AUTHOR]
While I owe apologies to Edsger Dijkstra, a leading member of the foundinggenera-tion of computer science, for mimicking the title of Dijkstra's influential 1968Communications article, my intent here is consis-ten...
详细信息
While I owe apologies to Edsger Dijkstra, a leading member of the foundinggenera-tion of computer science, for mimicking the title of Dijkstra's influential 1968Communications article, my intent here is consis-tent widi Dijkstra's spirit—promoting disciplinedpro-gramming—whether it is procedure-oriented (PO) or object-oriented (OO).
From the very earliest days of electronic computing, flowcharts have been used to represent the conceptual structure of complex software systems. In much of the literature on software development, the flowchart serves...
详细信息
From the very earliest days of electronic computing, flowcharts have been used to represent the conceptual structure of complex software systems. In much of the literature on software development, the flowchart serves as the central design document around which systems analysts, computer programmers, and end users communicate, negotiate, and represent complexity. And yet the meaning of any particular flowchart was often highly contested, and the apparent specificity of such design documents rarely reflected reality. Drawing on the sociological concept of the boundary object, this article explores the material culture of software development with a particular focus on the ways in which flowcharts served as political artifacts within the emerging communities of practices of computer programming.
This article presents an application support system for managing user interfaces. Application support systems can be categorized as top down and bottom up. The top-down tools suffer from being too far removed from the...
详细信息
This article presents an application support system for managing user interfaces. Application support systems can be categorized as top down and bottom up. The top-down tools suffer from being too far removed from the user, which makes functions that require additional user input problematic. The bottom-up tools, on the other hand, lend to be so far removed from the overall logic of the program that the programmer receives no support for things like command processing. Furthermore, the bottom-up tools that are currently available either provide little functionality or require that a fairly sophisticated, technical person provide the specifications. When both effective bottom-up tools and top-down tools are provided, the resulting application support system enables the programmer to concentrate on the solution to a particular problem and spend far less time than heretofore on the details of the user interaction. The people involved in an application project are the programmer, application manager, and the end user.
The article presents a research on why workers unionize emphasizes unfair treatment and dissatisfaction with terms and conditions of employment. Highly skilled technical workers, hereinafter called high-tech workers, ...
详细信息
The article presents a research on why workers unionize emphasizes unfair treatment and dissatisfaction with terms and conditions of employment. Highly skilled technical workers, hereinafter called high-tech workers, include systems analysts, hardware and software engineers, computer scientists and programmers, and webmasters. Herein, the research focuses on identities that high-tech workers hold as central to their conceptions of themselves as high-tech workers, that is, on the constellation of attribute, social, and global self-esteem-based identities that together make up their views of themselves as high-tech workers. High-tech workers may further screen opportunities to unionize by assessing whether they think that their would-be union colleagues would see them in terms of their high-tech worker identities as the high-tech workers see themselves. By enacting their high-tech roles and related identities, high-tech workers signal these identities to others who are then encouraged to define them as credible high-tech workers.
暂无评论