Access Restriction

Author Neumann, Peter G.
Source ACM Digital Library
Content type Text
Publisher Association for Computing Machinery (ACM)
File Format PDF
Language English
Abstract Ok, you expect your shrink-wrapped software to work properly, without annoying reliability bugs and security holes. Or maybe you would like the systems you develop to work properly, without serious risks to their users. But those systems don't quite work the way they are supposed to. So, what's new? Perusal of the Risks archives [1] suggests that startlingly few real success stories are recorded, and that perhaps we might as well just learn to live with almost every system having bugs—some even colossal in scope [2].
Age Range 18 to 22 years ♦ above 22 year
Educational Use Research
Education Level UG and PG
Learning Resource Type Article
Publisher Date 2005-08-01
Publisher Place New York
Journal Communications of the ACM (CACM)
Volume Number 38
Issue Number 12

Open content in new tab

   Open content in new tab
Source: ACM Digital Library