Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software by Design: Shaping Technology and The Workplace

Buy
As computers become more and more integral to business and other organizational operations around the world, software design must increasingly meet the social demands of the workplace. This book provides an informative, cogent examination of how various social factors--such as organizational structure, workplace relations, and market conditions--together shape software developers' technical design decisions. Through a survey of major software companies and in-depth case studies of the banking, hospital, and equipment field service industries, the authors identify factors that influence specific design strategies and examine the significant consequences that engineering decisions have on users' work, workplace quality of life, and opportunities for autonomy and skill development. The book concludes with a chapter devoted to exploring how a progressive design approach can improve both the performance and working conditions of an organization. By providing an important empirical study of the social construction of technology, the authors offer an insightful understanding of the challenges inherent in effective software design. The book will appeal to professionals and students in software design, information systems management, computer science, and the sociology of work and technology.

About the Author

Harold Salzman is at University of Louisville Center for Urban and Economic Research. Stephen R. Rosenthal is at Boston University School of Management.
(HTML tags aren't allowed.)

Plant-Pathogen Interactions: Methods and Protocols (Methods in Molecular Biology)
Plant-Pathogen Interactions: Methods and Protocols (Methods in Molecular Biology)

Plant-Pathogen Interactions: Methods and Protocols, Second Edition expands upon the first edition with current, detailed protocols for the study of plant pathogen genome sequences. It contains new chapters on techniques to help identify and characterize effectors and to study their impacts on host immunity and their roles in pathogen...

Ecosystem Ecology
Ecosystem Ecology

Jorgensen's Ecosystem Ecology provides a thorough and comprehensive overview of the world's aquatic and terrestrial ecosystems. This derivative volume based on the best-selling Encyclopedia of Ecology (published 2008) is the only book currently published that provides an overview of the world's ecosystems in a concise format.

...
Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice
Deploying IP and MPLS QoS for Multiservice Networks: Theory & Practice

QoS, short for "quality of service," is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including...


Professional Microsoft Robotics Developer Studio (Wrox Programmer to Programmer)
Professional Microsoft Robotics Developer Studio (Wrox Programmer to Programmer)

Microsoft Robotics Developer Studio (MRDS) offers an exciting new wayto program robots in the Windows environment. With key portions of the MRDS code available in source form, it is readily extensible and offers numerous opportunities for programmers and hobbyists. This comprehensive book illustrates creative ways to use the tools and...

Advertising 2.0: Social Media Marketing in a Web 2.0 World
Advertising 2.0: Social Media Marketing in a Web 2.0 World
Every day, print and online trade magazines and news sources tout developments in online advertising, branding, and marketing. Seismic shifts in the industry—like major advertisers setting up shop in Second Life and other alternate realities—have forced marketers and advertisers, ready or not, to employ new advertising models. But the...
Rootkits for Dummies (Computer/Tech)
Rootkits for Dummies (Computer/Tech)
A rootkit is a type of malicious software that gives the hacker "root" or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy