Cutting Hacking: Breaking from Tradition

نویسندگان

  • Rick Duley
  • Stanislaw P. Maj
چکیده

Student memories of introductory programming units regularly centre on seemingly interminable cycles of coding and debugging and the WIMP syndrome perpetuates this horror in the software development industry. Code construction is the one inescapable phase of the software development cycle yet educators seem unable to escape the mind-set which equates programming with syntax and semantics, condemning succeeding generations of students to this painful experience. Accumulated coding wisdom of more than four decades, now being codified in the SWEBOK, should smooth the process of learning to develop software if presented early in the student’s career. Typically, however, it continues to be presented in advanced programming units (or in other, specialised, units) rather than as fundamental understanding. As a consequence, code hacking is the norm in undergraduate years despite being antithetical to the Software Engineering ethos. This paper examines current practice and presents the view that what is needed is not a return to basics but rather an advance to basics — that syntax and semantics should be seen as a means of expression of formulated ideas and that student software engineers should be exposed immediately to the notion of code construction as the application of basic concepts rather than fluency in a language — thereby potentially bringing together programming practice and Software

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Systemizers Are Better Code-Breakers: Self-Reported Systemizing Predicts Code-Breaking Performance in Expert Hackers and Naïve Participants

Studies on hacking have typically focused on motivational aspects and general personality traits of the individuals who engage in hacking; little systematic research has been conducted on predispositions that may be associated not only with the choice to pursue a hacking career but also with performance in either naïve or expert populations. Here, we test the hypotheses that two traits that are...

متن کامل

From Rule-Breaking to ROM-Hacking: Theorizing the Computer Game-as-Commodity

This paper develops a theory of the game as a commodity form by looking at the unique practices of console hackers and videogame emulation communities. This theory argues for the necessity of understanding a game's system of rules in relation to the material conditions and constraints of the media within which it is constructed and distributed. After deriving the computer game-as-commodity from...

متن کامل

A Dynamic Security Model for Addressing Hacking Risk Factors

Communication technologies have a significant influence on the business industry. Exchanging information, storing and retrieving data, and cutting communication costs are prime reasons for relying heavily on these technologies. However, these technologies are significantly affected by hacking. Due to neglecting the behaviour of hackers during the initial design stage of common security solution...

متن کامل

Finite Element Modelling and Simulation of Chip Breaking with Grooved Tool

A finite element model is presented to simulate chip breaking when orthogonal turning medium carbon steel with a grooved cutting tool is used. The chip formation, chip breaking, cutting force, stress, strain and temperature are simulated by the thermo-elastic-plastic finite element method, using commercial finite element software. The cutting process is simulated from the initial to the steady-...

متن کامل

An analysis of strain in chip breaking using slip-line field theory with adhesion friction at chip/tool interface

A slip-line field model for orthogonal cutting with step-type chip breaker assuming adhesion friction at chip/tool interface is developed using Kudo’s basic slip-line field. An alternative method is suggested for estimation of breaking strain in the chip. The model proposed predicts that with decrease in distance of chip breaker from the cutting edge of the tool, the breaking strain and shear s...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002