Skip to main content Accessibility help
×
Hostname: page-component-78c5997874-mlc7c Total loading time: 0 Render date: 2024-11-16T16:16:06.707Z Has data issue: false hasContentIssue false

13 - Computer hardware and software, and stored information

Published online by Cambridge University Press:  05 June 2012

I. R. Walker
Affiliation:
University of Cambridge
Get access

Summary

Introduction

The ubiquity of computers in just about every aspect of experimental work, from their use in preliminary literature searches, through the collection and analysis of data, to the final publication of results, means that the consequences of their imperfections are unavoidable. Although hardware and software problems are both a possible cause of frustrations, the latter can be particularly insidious, and harder to solve.

The failure of hardware is sometimes heralded by unusual physical phenomena such as excessive vibrations or noises. On the other hand, failures of software take place suddenly and without warning. Also, again unlike the situation with hardware, the concept of safety margins (or “derating”) normally does not exist in software design. The enormous complexity of many types of software when compared with hardware makes the former particularly susceptible to unforeseen failure modes. (For example, operating systems and large applications often contain millions, or even tens of millions, of lines of source code.) These characteristics can all make software failures especially troublesome.

Computers and operating systems

Selection

Compared with many other electronic devices, computers (including their hardware, software, data storage, security and interconnection aspects) are generally very unreliable. Hence, and since they play such an important part in so many facets of research, it pays to use high-quality computer equipment and software.

The quality of computer hardware varies over a wide range – from systems of marginal dependability, to ones that can be counted on to give years of reliable service.

Type
Chapter
Information
Reliability in Scientific Research
Improving the Dependability of Measurements, Calculations, Equipment, and Software
, pp. 487 - 535
Publisher: Cambridge University Press
Print publication year: 2011

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

O'Connor, P. D. T., Practical Reliability Engineering, 4th edn, John Wiley & Sons Ltd., 2002.Google Scholar
Thompson, R. B. and Thompson, B. F., Repairing and Upgrading Your PC, O'Reilly, 2006.Google Scholar
www.consumerreports.org
Thompson, R. B. and Thompson, B. F., PC Hardware in a Nutshell, 3rd edn, O'Reilly, 2003. (Reference [2] is a useful follow-up to this book.)
ConsumerReports.org. Windows or Macintosh?, March 2006. www.consumerreports.org
Landau, T. and Frakes, D., Mac OS X Help Line: Tiger edition, Peachpit Press, 2005.Google Scholar
Easttom, C., Moving from Windows to Linux, Charles River Media, 2004.Google Scholar
Bovet, D. P. and Cesati, M., Understanding the Linux Kernel, 3rd edn, O'Reilly, 2005.Google Scholar
Bove, T., Just Say no to Microsoft: how to Ditch Microsoft and why it's not as Hard as you Think, No Starch Press, 2005. (Despite this book's heavy bias against Microsoft, it contains useful information about migrating from Windows to Mac OS and Linux, as well as the availability of non-Microsoft applications software.)
Chase, K. J., PC Disaster and Recovery, Sybex, 2003.Google Scholar
Torres, J. M. and Sideris, P., Surviving PC Disasters, Mishaps, and Blunders, Paraglyph, 2005.Google Scholar
Austerlitz, H., Data Acquisition Techniques using PCs, 2nd edn, Academic Press, 2003.Google Scholar
Petruzella, F. D., Programmable Logic Controllers, 3rd edn, McGraw-Hill, 2004.Google Scholar
Cougias, D. J., Heiberger, E. L., and Koop, K., The Backup Book: Disaster Recovery from Desktop to Data Center, 3rd edn, O'Connell, Laurie (ed.), Schaser-Vartan Books, 2003.Google Scholar
Meggelen, J., Madsen, L. and Smith, J., Asterisk: the Future of Telephony, O'Reilly, 2007.Google Scholar
,Agilent Technologies, RS-232 troubleshooting – Application note. http://cp.literature.agilent.com/litweb/pdf/5989-6580EN.pdf.
Axelson, J., Serial Port Complete: Programming and Circuits for RS-232 and RS-485 Links and Networks, Lakeview Research LLC, 2000.Google Scholar
Campbell, J., The RS-232 Solution, 2nd edn, Sybex, 1989.Google Scholar
Park, J., Mackay, S. and Wright, E., Practical Data Communications for Instrumentation and Control, Elsevier, 2003.Google Scholar
Horowitz, P. and Hill, W., The Art of Electronics, 2nd edn, Cambridge University Press, 1989.Google Scholar
,IPC Systems Limited, IEEE 488 troubleshooting – Application note, www.ipcsystems.ltd.uk/application_notes.html
,i365 (A Seagate Company). services.seagate.com
,Seagate Technology LLC, Pushbutton Backup External Hard Drives. www.seagate.com
Manquen, D., in Handbook for Sound Engineers, 3rd edn, Ballou, G. M. (ed.), Butterworth-Heinemann, 2002.Google Scholar
Preston, W. C., Backup and Recovery, O'Reilly, 2007.Google Scholar
Byers, F. R., National Institute of Standards and Technology (NIST), Care and handling of CDs and DVDs – a Guide for Librarians and Archivists, NIST special publication 500–252. www.itl.nist.gov/iad/894.05/docs/CDandDVDCareandHandlingGuide.pdf
Lu, R., Zheng, J., Slattery, O., Byers, F. and Tang, X., J. Res. Natl. Inst. Stand. Technol. 109, 517 (2004).
Bogart, J. W. C., Letter to the Editor, Scientific American, June 1995.
,National Initiative for a Networked Cultural Heritage (NINCH), The NINCH Guide to Good Practice in the Digital Representation and Management of Cultural Heritage Materials, 2002. www.nyu.edu/its/humanities/ninchguide/index.html
Bradley, T., Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security, Syngress, 2006.Google Scholar
Filiol, E., Computer Viruses: from Theory to Applications, Springer, 2005.Google Scholar
,ConsumerReports.org, Cyber-Insecurity Special Section. www.consumerreports.org/cro/electronics-computers/resource-center/cyber-insecurity/cyber-insecurity-hub.htm
,Microsoft Corporation, Security central, www.microsoft.com/security/
,Apple Inc., Apple Product Security, www.apple.com/support/security/
Acton, F. S., REAL Computing Made Real: Preventing Errors in Scientific and Engineering Calculations, Princeton University Press, 1996.Google Scholar
,NASA Glenn Research Center, Office of Safety Assurance Technologies, NASA Software Safety Guidebook (NASA-GB-1740.13). www.hq.nasa.gov/office/codeq/software/docs.htm
Longbottom, R., Computer System Reliability, John Wiley & Sons Ltd., 1980.Google Scholar
Raymond, E. S., The Cathedral and The Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary – Revised edition, O'Reilly, 2001.Google Scholar
Paulson, J. W., Succi, G., and Eberlein, A., IEEE Trans. Software Eng. 30, 246 (2004).
,National Instruments Corporation. www.ni.com
,Agilent Technologies. www.home.agilent.com
,measX GmbH & Co. KG. www.dasylab.com
Green, T. R. G. and Petre, M., J. Vis. Lang. Comput. 7, 131 (1996).CrossRef
Dempster, J., The Laboratory Computer: a Practical Guide for Physiologists and Neuroscientists, Academic Press, 2001.Google Scholar
McConnell, S. C., Code Complete, 2nd edn, Microsoft Press, 2004.Google Scholar
Kernighan, B. W. and Plauger, P. J., The Elements of Programming Style, 2nd edn, McGraw-Hill, 1978.Google Scholar
,Maplesoft, Inc., Maple. www.maplesoft.com
,Wolfram Research, Inc., Mathematica. www.wolfram.com
,The MathWorks, Inc., MATLAB. www.mathworks.com
Rushby, N. J., in Guide to Good Programming Practice, 2nd edn, Meek, B. L., Heath, P. M., and Rushby, N. J. (eds.), Ellis Horwood, 1983.Google Scholar
Sommerville, I., Software Engineering, 2nd edn, Addison-Wesley, 1985.Google Scholar
Keogh, J. and Giannini, M., OOP Demystified, McGraw-Hill Osborne, 2004.Google Scholar
Myers, G. J., Software Reliability: Principles and Practices, John Wiley & Sons, 1976.Google Scholar
Press, W. H., Teukolsky, S. A., Vetterling, W. T., and Flannery, B. P., Numerical Recipes: The Art of Scientific Computing, 3rd edn, Cambridge University Press, 2007.Google Scholar
,Visual Numerics, IMSL Numerical Libraries. www.vni.com
,Numerical Algorithms Group, NAG Numerical Library. www.nag.co.uk
GNU Scientific Library. www.gnu.org/software/gsl
Netlib Repository. www.netlib.org
Blume, P. A., The LabVIEW Style Book, Prentice Hall, 2007. (A useful summary of style rules can be found in the appendix.)Google Scholar
Press, W. H., Flannery, B. P., Teukolsky, S. A., and Vetterling, W. T., Numerical Recipes: The Art of Scientific Computing, Cambridge University Press, 1986.Google Scholar
Myers, G. J., Badgett, T., Thomas, T. M., and Sandler, C., The Art of Software Testing, 2nd edn, John Wiley & Sons, 2004.Google Scholar
Travis, J., LabView for Everyone, 2nd edn, Prentice Hall PTR, 2002.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure [email protected] is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×