Arguments that Count: Physics, Computing, and Missile by Rebecca Slayton

By Rebecca Slayton

In a swiftly altering international, we depend upon specialists to evaluate the promise and dangers of recent know-how. yet how do those specialists make feel of a hugely doubtful destiny? In Arguments that Count, Rebecca Slayton deals an immense new standpoint. Drawing on new old records and interviews in addition to views in technological know-how and know-how experiences, she offers an unique account of the way scientists got here to phrases with the extraordinary probability of nuclear-armed intercontinental ballistic missiles (ICBMs). She compares how varied specialist groups -- physicists and desktop scientists -- developed arguments in regards to the dangers of missile safety, and the way those arguments replaced through the years. Slayton exhibits that our realizing of technological hazards is formed via disciplinary repertoires -- the codified wisdom and mathematical principles that specialists use to border new demanding situations. And, considerably, a brand new repertoire can convey long-neglected dangers into transparent view.

In the Nineteen Fifties, scientists famous that high-speed pcs will be had to do something about the unheard of pace of ICBMs. however the nation's elite technology advisors had no technique to examine the hazards of desktops so used physics to evaluate what they can: radar and missile functionality. simply many years later, after developing computing as a technology, have been advisors capable of study authoritatively the hazards linked to complicated software program -- such a lot significantly, the chance of a catastrophic failure. As we proceed to confront new threats, together with that of cyber assault, Slayton bargains helpful perception into how other kinds of workmanship can restrict or extend our means to handle novel technological risks.

Show description

Read Online or Download Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012 PDF

Best security books

Information Security Fundamentals (2nd Edition)

Constructing a data protection application that clings to the primary of safeguard as a enterprise enabler needs to be step one in an enterprise’s attempt to construct an efficient protection application. Following within the footsteps of its bestselling predecessor, info defense basics, moment variation offers details safeguard pros with a transparent figuring out of the basics of safeguard required to deal with the diversity of concerns they're going to event within the box.

Securing VoIP: Keeping Your VoIP Network Safe

Securing VoIP: holding Your VoIP community secure will aid you take the initiative to avoid hackers from recording and exploiting your company's secrets and techniques. Drawing upon years of functional event and utilizing quite a few examples and case reports, know-how guru Bud Bates discusses the enterprise realities that necessitate VoIP approach safety and the threats to VoIP over either twine and instant networks.

Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings

This booklet constitutes the refereed complaints of the sixth overseas convention on belief and privateness in electronic enterprise, TrustBus 2009, held in Linz, Austria, in September 2009 together with DEXA 2009. The sixteen revised complete papers offered have been conscientiously reviewed and chosen from quite a few submissions.

Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings

This e-book offers the complaints of the seventh foreign convention on belief, P- vacy and safeguard in electronic company (TrustBus 2010), held in Bilbao, Spain in the course of August 30–31, 2010. The convention persevered from prior occasions held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009).

Extra resources for Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012

Sample text

A three-dimensional interception was out of the question. So his group prescribed the height of the “hostile” aircraft and programmed the computer to conduct its calculations in two dimensions. ”40 But Forrester needed to do more than demonstrate the feasibility of Whirlwind. He also needed to make the case that an electronic digital computer was the best way to coordinate a complex system. ”41 Rather than building complicated electronic equipment to connect each new piece of hardware, engineers would just write a computer program.

The decoys and chaff would move at the same speed as the warhead, while reflecting confusing signals back to radars. These and many other countermeasures were so readily derived from well-known principles in physics and radar engineering, that they would eventually be published in the open literature, as we will see in future chapters. 10 Thus, members of the Killian committee expected that warheads would only become visible in their final few minutes of flight, as they plummeted down through the earth’s atmosphere, while lightweight decoys slowed or burned up.

The EDSAC was one floor up from the equipment necessary to write or change a program. Wilkes repeatedly amended code on the first floor and tested code on the second: “On one of my journeys . . ”14 Wilkes and others took steps to make programming more intuitive. Rather than writing all their programs in binary machine language, Wilkes Software and the Race against Surprise Attack 21 introduced equipment that translated letter instructions into binary code. And his team designed “subroutine libraries,” collections of short, frequently used programs stored on tape.

Download PDF sample

Rated 4.12 of 5 – based on 40 votes