Metamorphosis: A Programmer Looks at the Software Crisis
Author: William Beckett
Publisher: Numerical Analog, Inc.
Price: $15 US
Reviewer: Harvey Friedman
One of the reasons I agreed to review this book was that I was intrigued by the title. Could this possibly be a Kafkaesque treatise on debugging? As I read it, I realized that such was not the case. I found the style more Conradian, as in Heart of Darkness.
The book has three main sections. The first, comprising 9 chapters, is a response to an article in the September 1994 issue of Scientific American titled “Software's Chronic Crisis”. The author, William Beckett, is an experienced systems designer/programmer who has used many programming languages on many hardware platforms. The writer of the Scientific American piece appeared to be without an extensive computer background, so drew much of his article from management apologetics and computer shock headlines in the popular press.
Beckett responds section by section, paragraph by paragraph, and even line by line in these nine chapters. His theme is common sense or pragmatism. Non-entrepreneurial programmers will enjoy this part of the book because it is the working stiff talking back to “Dilbert”-style management.
Section 2 comprises chapters 10-15. Here, Beckett reprints and discusses letters and responses from Paul Allen and from Wired. He uses lots of personal anecdotes illustrating points he wants to emphasize. This too is a good read, particularly for the disenchanted.
Section 3, chapters 16-21, is where things become highly speculative. One could say that here we have a melange of science fiction, hermeneutics, New Age thoughts, etc. Section 3 should be called “the world according to Beckett, and how Beckett would make it better”. I found myself slogging through the final section.
Overall, this book could provide useful reflection for programmers who are not so overworked that they have time to actually read and think about his controversial ideas. The avowed purpose of the book “is to provide professional men and women in creative fields with a perspective on current Western ideology which is capable of transforming it for the better”. He supports it with an eclectic bibliography of 54 items for further reading. This book will not be everyone's cup of tea by any means, but some might find a few good ideas or explanations.
Metamorphosis can be purchased through amazon.com, or write the publisher at P.O. Box 631, Snohomish, WA 98291 for more information.
Harvey Friedman is a computer consultant at the University of Washington, functioning either as system administrator or statistical analyst. In his leisure time he likes playing with Linux and enjoys orienteering, the sport of navigation. He can be reached via e-mail at email@example.com.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- BitTorrent Inc.'s Sync
- The US Government and Open-Source Software
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide