Stalking the Elusive Computer Bug

نویسنده

  • Peggy Aldrich Kidwell
چکیده

From at least the time of Thomas Edison, U.S. engineers have used the word “bug” to refer to flaws in the systems they developed. This short word conveniently covered a multitude of possible problems. It also suggested that difficulties were small and could be easily corrected. IBM engineers who installed the ASSC Mark I at Harvard University in 1944 taught the phrase to the staff there. Grace Murray Hopper used the word with particular enthusiasm in documents relating to her work. In 1947, when technicians building the Mark II computer at Harvard discovered a moth in one of the relays, they saved it as the first actual case of a bug being found. In the early 1950s, the terms “bug” and “debug,” as applied to computers and computer programs, began to appear not only in computer documentation but even in the popular press.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Stalking: The elusive crime

Stalking has been labelled ‘the crime of the nineties’ (e.g. Goode, 1995). Yet despite international media interest there has been surprisingly little research carried out on the phenomenon. Much of the literature that does exist takes a discursive form, focuses on the pursuit of celebrities and other public Ž gures (Dietz et al., 1991; Fein & Vossekuil, 1998) or attempts to form typologies of ...

متن کامل

The Effect of Bug Damage on Physicochemical, Electrophoretic and Quality Factors of Wheat Gluten

One of the most important forms of preharvest damage to wheat is caused by sunn pests. The insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. Flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. In the present study three wh...

متن کامل

Test Frameworks for Elusive Bug Testing

Elusive bugs can be particularly expensive because they often survive testing and are released in a deployed system. They are characterized as involving a combination of properties. One approach to their detection is bounded exhaustive testing (BET). This paper describes how to implement BET using a variation of JUnit, called BETUnit. The idea of a BET pattern is also introduced. BET patterns d...

متن کامل

Bed bug (Cimex lectularis) outbreak: A cross-sectional study in Polour, Iran

Background: Cimex lectularius (bed bug) are insects abundantly found in hot, temperate areas. This study is related to the outbreak of Cimex lectularius in a construction site around Polour in Amol, Iran. This cross-sectional study has examined 182 prefabricated houses made of intermodal containers [Conex] converted to a temporary housing, in a construction site.Methods...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IEEE Annals of the History of Computing

دوره 20  شماره 

صفحات  -

تاریخ انتشار 1998