front cover of Chromatic Algorithms
Chromatic Algorithms
Synthetic Color, Computer Art, and Aesthetics after Code
Carolyn L. Kane
University of Chicago Press, 2014
These days, we take for granted that our computer screens—and even our phones—will show us images in vibrant full color. Digital color is a fundamental part of how we use our devices, but we never give a thought to how it is produced or how it came about.
           
Chromatic Algorithms reveals the fascinating history behind digital color, tracing it from the work of a few brilliant computer scientists and experimentally minded artists in the late 1960s and early ‘70s through to its appearance in commercial software in the early 1990s. Mixing philosophy of technology, aesthetics, and media analysis, Carolyn Kane shows how revolutionary the earliest computer-generated colors were—built with the massive postwar number-crunching machines, these first examples of “computer art” were so fantastic that artists and computer scientists regarded them as psychedelic, even revolutionary, harbingers of a better future for humans and machines. But, Kane shows, the explosive growth of personal computing and its accompanying need for off-the-shelf software led to standardization and the gradual closing of the experimental field in which computer artists had thrived.
           
Even so, the gap between the bright, bold presence of color onscreen and the increasing abstraction of its underlying code continues to lure artists and designers from a wide range of fields, and Kane draws on their work to pose fascinating questions about the relationships among art, code, science, and media in the twenty-first century.
[more]

front cover of Feminist in a Software Lab
Feminist in a Software Lab
Difference + Design
Tara McPherson
Harvard University Press, 2018

For over a dozen years, the Vectors Lab has experimented with digital scholarship through its online publication, Vectors, and through Scalar, a multimedia authoring platform. The history of this software lab intersects a much longer tale about computation in the humanities, as well as tensions about the role of theory in related projects.

Tara McPherson considers debates around the role of cultural theory within the digital humanities and addresses Gary Hall’s claim that the goals of critical theory and of quantitative or computational analysis may be irreconcilable (or at the very least require “far more time and care”). She then asks what it might mean to design—from conception—digital tools and applications that emerge from contextual concerns of cultural theory and, in particular, from a feminist concern for difference. This path leads back to the Vectors Lab and its ongoing efforts at the intersection of theory and praxis.

[more]

front cover of Foundations for Model-based Systems Engineering
Foundations for Model-based Systems Engineering
From patterns to models
Jon Holt
The Institution of Engineering and Technology, 2016
The practice of Model-based Systems Engineering is becoming more widely adopted in industry, academia and commerce and, as the use of modelling matures in the real world, so the need for more guidance on how to model effectively and efficiently becomes more prominent. This book describes a number of systems-level 'patterns' (pre-defined, reusable sets of views) that may be applied using the systems modelling language SysML for the development of any number of different applications and as the foundations for a system model.
[more]

front cover of Histories of Computing
Histories of Computing
Michael Sean MahoneyEdited and with an introduction by Thomas Haigh
Harvard University Press, 2011

Computer technology is pervasive in the modern world, its role ever more important as it becomes embedded in a myriad of physical systems and disciplinary ways of thinking. The late Michael Sean Mahoney was a pioneer scholar of the history of computing, one of the first established historians of science to take seriously the challenges and opportunities posed by information technology to our understanding of the twentieth century.

Mahoney’s work ranged widely, from logic and the theory of computation to the development of software and applications as craft-work. But it was always informed by a unique perspective derived from his distinguished work on the history of medieval mathematics and experimental practice during the Scientific Revolution. His writings offered a new angle on very recent events and ideas and bridged the gaps between academic historians and computer scientists. Indeed, he came to believe that the field was irreducibly pluralistic and that there could be only histories of computing.

In this collection, Thomas Haigh presents thirteen of Mahoney’s essays and papers organized across three categories: historiography, software engineering, and theoretical computer science. His introduction surveys Mahoney’s work to trace the development of key themes, illuminate connections among different areas of his research, and put his contributions into context. The volume also includes an essay on Mahoney by his former students Jed Z. Buchwald and D. Graham Burnett. The result is a landmark work, of interest to computer professionals as well as historians of technology and science.

[more]

logo for The Institution of Engineering and Technology
Industrial Software Technology
R.J. Mitchell
The Institution of Engineering and Technology, 1987
A number of interrelated developments are changing the nature of software technology. Developments in hardware are putting greatly increased power at the disposal of the software technologist. Advances in formal methods are providing the means to bring greater precision into the early stages of system development. Techniques such as expert systems are being brought into the domain of software technology as a result of advances in the application of artificial intelligence research. Developments in paradigms of system development are giving the software technologist better models of system structure and better tools and techniques for creating large systems, and greater political recognition of the importance of information technology is resulting in increased funding for research and development in software technology.
[more]

logo for The Institution of Engineering and Technology
Knowledge Discovery and Data Mining
M.A. Bramer
The Institution of Engineering and Technology, 1999
Modern computing systems of all kinds accumulate various data at an almost unimaginable rate. Alongside the advances in technology that make such storage possible has grown a realisation that buried within this mass of data there may exist some knowledge of considerable value. This could be information critical for a company's business success or something leading to a scientific or medical discovery or breakthrough. Most data is simply stored and never examined, but machine-learning technology has the potential to extract knowledge of value (i.e. data mining).
[more]

logo for The Institution of Engineering and Technology
Managing Complexity in Software Engineering
R.J. Mitchell
The Institution of Engineering and Technology, 1990
Software engineering products are becoming ever more complex, because software is being used in the solution of more technically difficult problems and because the size of software projects continues to grow. A key question for software engineers is how to cope with this complexity. There is no single answer, and software engineers must attack the problem from a number of perspectives. A technical perspective reveals new paradigms for system development, including two paradigms that show particular promise: object-oriented design and formal methods. A management perspective recognises that good project management is vital to the success of a complex project. The scale of modern projects makes it essential to use automated support, so software engineers must also look at how to manage complexity from an automation perspective. Automated support can come in the form of discrete tools for particular tasks, or a packaged set of tools in a support environment.
[more]

front cover of Play to Submission
Play to Submission
Gaming Capitalism in a Tech Firm
Tongyu Wu
Temple University Press, 2024
Games are often a fun perk of a tech company job, and employees can “play to win” in the competition to succeed. But in studying “Behemoth” (a pseudonym for a top American tech company), Tongyu Wu discovered that gaming work culture was far more insidious.

Play to Submission shows how Behemoth’s games undermined and manipulated workers. They lost their work-life balance and the constant competition made labor organizing difficult. Nonetheless, many workers embraced management’s games as a chance to show off their “gamer” identities and create a workplace culture with privileged insiders and exiled outsiders, with female and migrant workers usually in the latter group. Moreover, Wu indicates this may be the future of work for high- and low-skilled and, creative workers in an environment where capitalists have heightened demands for technology and creativity.

Drawing from 13 months of ethnographic work, Wu presents a persistent reality in which the company reaps the reward of surplus productivity, leaving employees themselves in a highly competitive and sometimes precarious work position.
[more]

front cover of Privacy’s Blueprint
Privacy’s Blueprint
The Battle to Control the Design of New Technologies
Woodrow Hartzog
Harvard University Press, 2018

Every day, Internet users interact with technologies designed to undermine their privacy. Social media apps, surveillance technologies, and the Internet of Things are all built in ways that make it hard to guard personal information. And the law says this is okay because it is up to users to protect themselves—even when the odds are deliberately stacked against them.

In Privacy’s Blueprint, Woodrow Hartzog pushes back against this state of affairs, arguing that the law should require software and hardware makers to respect privacy in the design of their products. Current legal doctrine treats technology as though it were value-neutral: only the user decides whether it functions for good or ill. But this is not so. As Hartzog explains, popular digital tools are designed to expose people and manipulate users into disclosing personal information.

Against the often self-serving optimism of Silicon Valley and the inertia of tech evangelism, Hartzog contends that privacy gains will come from better rules for products, not users. The current model of regulating use fosters exploitation. Privacy’s Blueprint aims to correct this by developing the theoretical underpinnings of a new kind of privacy law responsive to the way people actually perceive and use digital technologies. The law can demand encryption. It can prohibit malicious interfaces that deceive users and leave them vulnerable. It can require safeguards against abuses of biometric surveillance. It can, in short, make the technology itself worthy of our trust.

[more]

front cover of Rhetorical Code Studies
Rhetorical Code Studies
Discovering Arguments in and around Code
Kevin Brock
University of Michigan Press, 2019
Winner of the 2017 Sweetland Digital Rhetoric Collaborative Book Prize
                                                                                        
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct arguments that are made up of logical procedures and express both implicit and explicit claims as to how a given program operates.

Building on current scholarly work in digital rhetoric, software studies, and technical communication, Brock connects and continues ongoing conversations among rhetoricians, technical communicators, software studies scholars, and programming practitioners to demonstrate how software code and its surrounding discourse are highly rhetorical forms of communication. He considers examples ranging from large, well-known projects like Mozilla Firefox to small-scale programs like the “FizzBuzz” test common in many programming job interviews. Undertaking specific examinations of code texts as well as the contexts surrounding their composition, Brock illuminates the variety and depth of rhetorical activity taking place in and around code, from individual differences in style to changes in large-scale organizational and community norms.

Rhetorical Code Studies holds significant implications for digital communication, multimodal composition, and the cultural analysis of software and its creation. It will interest academics and students of writing, rhetoric, and software engineering as well as technical communicators and developers of all types of software.
[more]

front cover of Troubled IT Projects
Troubled IT Projects
Prevention and turnaround
John M. Smith
The Institution of Engineering and Technology, 2001
Many IT projects are doomed before the ink is dry on the contract. In this highly readable book, John Smith sets out the 40 root causes of troubled IT projects and explains how these can be avoided at each stage of the project life cycle.
[more]


Send via email Share on Facebook Share on Twitter