11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Ritchie, Dennis 409services to quickly assemble a dossier <strong>of</strong> sensitive informationon any individual was greatly increased. Here we havea case where a powerful tool for productivity (the Internet)also becomes a facilitator for using the vulnerabilities inany one system to compromise others.In an increasingly networked <strong>and</strong> technologically-dependentworld, the anticipation <strong>and</strong> prevention <strong>of</strong> computerrisks has become very important. To the extent companiesmay be legally liable for the more direct forms <strong>of</strong> risk, thereis more incentive for them to devote resources to risk amelioration.However, many computer-related risks are at leastas much social as technological in nature, <strong>and</strong> are beyondthe scope <strong>of</strong> concern <strong>of</strong> any one company or organization.Social risks ultimately dem<strong>and</strong> a broader social response.<strong>Technology</strong> itself can be used to help ameliorate technologicalrisks. Artificial intelligence techniques (see expertsystems <strong>and</strong> neural network) might be used improve theability <strong>of</strong> a system to adapt to unusual conditions. However,any such programming then becomes prone to bugs <strong>and</strong>risks itself.So far, the most successful way to deal with the broadrange <strong>of</strong> computer risks has been through human collaborationas facilitated by the Internet. Through venues such asthe Risks Forum computer-mediated communications <strong>and</strong>collaboration allows for the pooling <strong>of</strong> human intelligence inthe face <strong>of</strong> the growing complexity <strong>of</strong> human inventiveness.Further ReadingComp.risks [access via Google Groups]. Available online. URL:http://groups.google.com/group/comp.risks/topics. AccessedAugust 19, 2007.Glass, Robert L. S<strong>of</strong>tware Runaways: Monumental S<strong>of</strong>tware Disasters.Upper Saddle River, N.J.: Prentice Hall, 1997.Neumann, Peter G. <strong>Computer</strong>-Related Risks. Reading, Mass.: Addison-Wesley,1994.Peterson, Ivars. Fatal Defect: Chasing Killer <strong>Computer</strong> Bugs. NewYork: Vintage Books, 1996.Ritchie, Dennis(1941– )American<strong>Computer</strong> ScientistTogether with Ken Thompson, Dennis Ritchie developedthe UNIX operating system <strong>and</strong> the C programming language—twotools that have had a tremendous impact onthe world <strong>of</strong> computing for three decades.Ritchie was born on September 9, 1941, in Bronxville,New York. He was exposed to communications technology<strong>and</strong> electronics from an early age because his father wasdirector <strong>of</strong> the Switching Systems Engineering Laboratoryat Bell Laboratories. (Switching theory is closely akinto computer logic design.) Ritchie attended Harvard University<strong>and</strong> graduated with a B.S. in physics. However, bythen his interests had shifted to applied mathematics <strong>and</strong> inparticular, the mathematics <strong>of</strong> computation, which he laterdescribed as “the theory <strong>of</strong> what machines can possiblydo” (see computability <strong>and</strong> complexity). For his doctoralthesis he wrote about recursive functions (see recursion).Together with Ken Thompson, Dennis Ritchie developed the UNIXoperating system <strong>and</strong> the C programming language, two <strong>of</strong> themost important developments in the history <strong>of</strong> computing. (Photocourtesy <strong>of</strong> Lucent Technologies’ Bell Labs)This topic was proving to be important for the definition <strong>of</strong>new computer languages in the 1960s (see Algol).In 1967, however, Ritchie decided that he had had enough<strong>of</strong> the academic world. Without finishing the requirementsfor his doctorate, he started work at Bell Labs, his father’semployer. Bell Labs has made a number <strong>of</strong> key contributionsto communications <strong>and</strong> information theory (see researchlaboratories in computing).By the late 1960s, computer operating systems hadbecome increasingly complex <strong>and</strong> unwieldy. As typified bythe commercially successful IBM System/360, the operatingsystem was proprietary, had many hardware-specific functions<strong>and</strong> trade<strong>of</strong>fs in order to support a family <strong>of</strong> upwardlycompatible computer models, <strong>and</strong> was designed with a topdownapproach.During his graduate studies, however, Ritchie hadencountered a different approach to designing an operatingsystem. A new system called Multics was being designedjointly by Bell Labs, MIT, <strong>and</strong> General Electric. Multics wasquite different from the batch-processing world <strong>of</strong> mainframes:It was intended to allow many users to share acomputer. He had also done some work with MIT’s Project

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!