Stalking the Elusive Computer Bug
نویسنده
چکیده
From at least the time of Thomas Edison, U.S. engineers have used the word “bug” to refer to flaws in the systems they developed. This short word conveniently covered a multitude of possible problems. It also suggested that difficulties were small and could be easily corrected. IBM engineers who installed the ASSC Mark I at Harvard University in 1944 taught the phrase to the staff there. Grace Murray Hopper used the word with particular enthusiasm in documents relating to her work. In 1947, when technicians building the Mark II computer at Harvard discovered a moth in one of the relays, they saved it as the first actual case of a bug being found. In the early 1950s, the terms “bug” and “debug,” as applied to computers and computer programs, began to appear not only in computer documentation but even in the popular press.
منابع مشابه
Stalking: The elusive crime
Stalking has been labelled ‘the crime of the nineties’ (e.g. Goode, 1995). Yet despite international media interest there has been surprisingly little research carried out on the phenomenon. Much of the literature that does exist takes a discursive form, focuses on the pursuit of celebrities and other public gures (Dietz et al., 1991; Fein & Vossekuil, 1998) or attempts to form typologies of ...
متن کاملThe Effect of Bug Damage on Physicochemical, Electrophoretic and Quality Factors of Wheat Gluten
One of the most important forms of preharvest damage to wheat is caused by sunn pests. The insects insert their mouth parts into the immature grain and while injecting their saliva suck the milky juices. Flour from damaged wheat results in low baking performance due to the bug proteolytic enzymes’ injected which cause the breakdown of gluten structure in the dough. In the present study three wh...
متن کاملTest Frameworks for Elusive Bug Testing
Elusive bugs can be particularly expensive because they often survive testing and are released in a deployed system. They are characterized as involving a combination of properties. One approach to their detection is bounded exhaustive testing (BET). This paper describes how to implement BET using a variation of JUnit, called BETUnit. The idea of a BET pattern is also introduced. BET patterns d...
متن کاملBed bug (Cimex lectularis) outbreak: A cross-sectional study in Polour, Iran
Background: Cimex lectularius (bed bug) are insects abundantly found in hot, temperate areas. This study is related to the outbreak of Cimex lectularius in a construction site around Polour in Amol, Iran. This cross-sectional study has examined 182 prefabricated houses made of intermodal containers [Conex] converted to a temporary housing, in a construction site.Methods...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Annals of the History of Computing
دوره 20 شماره
صفحات -
تاریخ انتشار 1998