Byte Wars: The Impact of September 11 on Information Technology Paperback – Mar 22 2002
No Kindle device required. Download one of the Free Kindle apps to start reading Kindle books on your smartphone, tablet, and computer.
To get the free app, enter your e-mail address or mobile phone number.
Less sensationalistic than its title suggests, Byte Wars: The Impact of September 11 on Information Technology compiles software developer Edward Yourdon's timely concerns about 21st century IT security. Specifically addressing government officials, corporate executives, IT managers, programmers and citizens, he identifies risks to safety, privacy and other fundamental values and provides concrete steps they (that is, we) can take to disarm threats.
Yourdon is well known for having beaten the Y2K drum vigorously, and it would be easy to mistake him for a hysteria monger. His clarity, confidence and good humour will quickly allay any doubts in the reader's mind--though some of his ideas have only the most tenuous link to the events of 9/11/2001, they are all well considered and valuable as we move further into an era we don't yet understand.
Examining emergent systems, resiliency, death-march projects and more with an eye toward securing our lives and liberty, Byte Wars gives us an optimistic look at our murky future. --Rob Lightner
From the Inside Flap
This is not a book I expected to write.
Indeed, it's highly unlikely that I would have written Byte Wars, had it not been for the awful events of September 11th. But even without the attacks on the World Trade Center and the Pentagon, someone should have been writing about the disruptive, chaotic changes we face in the coming yearschanges enabled and facilitated by technology. As it turns out, many scientists, pundits, and gurus have been writing such books in recent years, including some about terrorism and bio-warfare to which we should have been paying much more attention. But most of the recent books dealing with the future of computers and the field of information technology (IT) have focused on the glamorous future of e-commerce and the Internet; ironically, that future appears much less glamorous than it did just a short while ago.
One of the themes in Byte Wars is that a number of changes-not just gentle, incremental changes, but massive, paradigm-shift changeshave actually been underway for the past several years. The events of September 11th have crystallized those changes, forcing us to confront and acknowledge some new realities that we have ignored for too long. For example, anyone who accesses the Internet is aware of the rash of computer-based viruses and worms that have proliferated since the "Love Bug" episode a couple years ago. But we may not have faced up to the terrifying threat of "zombie armies" of powerful home computers with high-speed, always-on Internet connections, computers that can be invaded by hackers and reprogrammed to launch denial-of-service attacks on businesses and government agencies.
It doesn't take a rocket scientist to see that computer technology is going to play a central role in the war on terrorism being formulated by the U.S. government as this book goes to press. Not only are we likely to see billions of dollars invested in a new generation of laser-guided missiles, computer-assisted weapons, but we'll see a vast array of scanning devices, face-recognition devices, and other computer technologies to enhance identification and tracking of suspect individuals. We'll see the development and integration of public-sector and private-sector databases, which will raise a plethora of privacy issues and concerns. And we'll see an enormous increase in the techniques and technologies for protecting telecommunication networks, Web sites, Internet portals, and other computer-dependent aspects of the nation's "critical infrastructure."
Even so, many IT professionals may be predisposed to view these activities as nothing more than a "political" response to September 11th, much like the Cold War was a response to the actions of the former Soviet Union after World War II. As such, the reaction to September 11th is obviously a much less upbeat and cheerful response than that caused by the fall of the Berlin Wall, the reunification of Germany, and the collapse of the Soviet Empire in the late 1980s and early 1990s. Americansincluding not only IT professionals, but everyone else, toomust now confront the discomforting reality that they are no longer protected by two vast oceans. They must confront the reality that some conflicts, especially those that involve deep ethnic and religious disputes, can go on for generations and centuries. And they must confront what they've heard for years, but never really accepted: not everyone appreciates or approves of Coca-Cola, McDonald's, Disney World, MTV, Hollywood, and various other trappings of the American way of life.
I don't have much advice to offer when it comes to politics, religion or ethnic disputes. And the only observation I'll make about Coca-Cola, McDonald's, and Disney World is that our corporate executives might be well advised to re-examine their built-in assumptions that globalization is always a good thing. Perhaps we don't need the same corporate logo on every office building around the world; perhaps we shouldn't be attempting to impose the same standardized payroll and inventory control system on every regional office around the world; perhaps not everyone wants to see the same MTV video clips and the same Hollywood movies. Maybe what our technology has done for us, as Clue Train Manifesto co-author David Weinberger suggests in the title of his forthcoming book, is to make it possible for peaceful coexistence in a global environment consisting of "small pieces, loosely joined."
Or maybe not. The point is that technology is a factor in these choices and decisions. Thus, while many IT professionals may prefer to think about September 11th as nothing but a terrorist attack, and while they may believe that the enormous response to that attack is nothing more than politics and military saber-rattling, their crown jewelsthe most advanced and most sophisticated computer technology that they createwill be at the heart of that response. And that will be true not just for the next few weeks or months; I fully agree with the predictions that September 11th has ushered in an era that will last as long as the Cold War lasted. The fact that it will almost certainly last to the end of my life is only a trifle troubling to me; the fact that it may be the dominant influence on the lives and careers of my children, and their children, is something I don't feel I can ignoreparticularly if that future is influenced significantly by the computer-based technologies that we IT professionals create.
So it's important for us to think about the topics in this booknot just the obvious topics of security and risk management, but also the somewhat less-understood topics of emergent systems and resilient systems, as well as the controversial concepts of good-enough systems and death-march projects. Not everyone will agree with the themes and recommendations I've offered on the following pages. That doesn't particularly bother me, but I do think it's important to remind the relatively young, idealistic IT professionals that existing power structures in corporations and government agencies may do little more than pay lip service to concepts such as emergent systems and resilient systems. Resiliency almost always implies redundancy, and the creation of enough "slack" in a system to withstand unanticipated disruptions; that's hard to justify in today's super-efficient, cost-conscious, lean-and-mean business environment.
And the notion that ad hoc, grass-roots systems can emerge on their own (supported, in many cases, by the peer-to-peer communication technologies that we IT professionals supply) and do a better job of responding to unplanned, disruptive threats is an anathema to traditional top-down, hierarchically managed organizations. It's worth remembering that the U.S. military, with all of its awesome resources, was unable to prevent two commercial airlines from crashing into the World Trade Center, nor a third plane from crashing into its very nerve center in Washington, DC. From that perspective, it's sobering indeed to realize that the only hijacked plane that was prevented from reaching its target on September 11th was United flight 93, in which a group of utter strangers, with no preconceived strategy and no top-down leadership, managed to create an ad hoc, grass-roots plan to take matters into their own hands.
It's customary, in a preface like this, for the author to acknowledge and thank the individuals who provided assistance in the creation of a book. But for me, that would require thanking almost everyone I've known since childhood; I am nothing more than the product of friendship, love, advice, guidance, and mentoring from thousands of friends, family members, business colleagues, former bosses, co-workers, and students.
But my wife and children deserve special thanks for tolerating periods when I would "tune out" in mid-sentence and begin thinking about the chapter I was working on. And my colleagues at the Cutter Consortium deserve special thanks, too, for many provocative and thought-provoking discussions about the future of computer technology. Numerous individuals, including anonymous Internet denizens from all over the world, provided valuable feedback and suggestions as I posted chapters of the manuscript online. And Steve Heller, who always loves to remind me of my 1975 prediction, in Techniques of Program Structure and Design, that "unless you're very rich or very eccentric, you'll never have your own computer," deserves special thanks for reading every word of every chapter, critiquing and challenging everything I wrote. Finally, a high-powered "death-march" team at Prentice Hall, headed up by Kathleen Caren and Paul Petralia, worked valiantly to bring the book out in record time. Of course, any mistakes that remain are my responsibility alone.Ed Yourdon
New York, NY and
Taos, New Mexico
February 2002 See all Product Description
Top Customer Reviews
My guess is that, on 1/1/2000, Ed was hunkering down in his survival retreat, drinking his bottled water, and wondering where in god's name his credibility went.
Given that his career as an oracle was cut short, Ed decided that he'd stop predicting the future and start cashing out on the 9/11 mania. Just like any talk show host or stand up comedian, Ed found ample material to make a few bucks off of the hysteria. He demonstrated the kind of initiative that would make Jeraldo Rivera proud.
The goal of this book is to keep Ed's name in circulation, so that he can charge a few more dollars for his worthless consulting services. Perhaps he'll use the royalties to refinish his deck or replace the transmission in his aging sports car. Ed's not going to tell you anything you don't already know, he's just going to make you think he will (which is the trick he uses to get you to buy it).
This leads me to think that I need to write Ed a letter...
Hello there little trooper. Isn't time for someone to pack it up and call it a career? Wouldn't the whole industry benefit if you took your fat, wrinkled, mug out of the public eye.
You pretty much admitted, in DeathMarch, that structured analysis was a crock. Face it, old man, you're over the hill. You've got no good ideas left. You're so desperate for ideas that you're reprinting Deathmarch. What are you going to do next time, reprint Time Bomb 2000!Read more ›
thought in it, and almost no depth. The main thread running
through it is that September 11th changed all of the rules and
a secondary thread is that Ed had finally twigged to the fact
that many other races and nationalities don't like the style
business practices and methods of the US of A.
Well Ed, September 11th didn't alter ANY rules of computer
security, it just moved security to a brighter location
in the CEO's firmanent and most third worlders have loathed
the USA for as long as I've been on the planet. They've just
got a lot more effective in expressing that feeling lately.
I can honestly say I expected a book with some technical
appreciation of the problem and some working methods for
bypassing and sidelining mid-level managers whose major
worry is the number of fly-buys they've racked up for
If you're looking for answers or technical tips on Infowar
don't spend your money on this ... book, its a yaaaawwwwnnn!
The author speaks directly to the reader in his typically confident tone, but the voice this time is more sober. There is not much of the typical humor we expect from Ed Yourdon, he is clearly shaken and sobered, like most of us, by the horrific events of Sept. 11th. Indeed, the first sentence, "This is not a book I expected to write" is a harbinger of much of the book's the sobering matter.
The structure of the book is straightforward: It begins with an overview of the broad changes which will profoundly affect industrialized and developing countries. This introduction is followed by more specific, detailed chapters about major aspects of IT and thoughtful predictions of sweeping changes to come in the areas of security, risk management, emergent systems, resilient systems, good enough systems, and death-march projects. A note about the "Death-March" chapter--it may suffice as an introduction to this topic for the general reader, and provides a timely update on the topic for readers of Mr. Yourdon's earlier book by the same title.
This is an important book-particularly for IT professional and those directly affected by the IT industry. I highly recommended Byte Wars for this audience as well as general business readers and thoughtful readers of the general public.
Anyway, y2K was theoretical when everyone was writing those books, nobody knew for sure what might happen or might not happen. September 11 was real, the only question is whether something like it might happen again. The terrorists say that it will, and the government bigwigs say that its pretty likely. So the question is what should we do about it.
I thought maybe Yourdan was going to talk about anthrax and smallpox and nuclear bombs in his book but he doesn't. He only talks about the computer risks. I don't see why anyone wold attack my computer at home, so I was skeptical at first. But he made me think a lot about the idea of grass-roots networks and what he calls emergent systems, because things are happening too fast and too unpredictable for the government to tell us what to do. Like it took the government six months to come up with this color coded alert system, and all they can do is tell us we are at yellow alert right now but they don't tell us what we should do about it. We have to figure it out by ourselves, we're on our own.
I see some other people are saying Yourdan only wrote what you could find in other books. Well maybe so, but he has a bibliography with 54 books in it, and I'm sure glad I didn't have to buy all those books and read them to understand what's going on. And it looks like he tracked down hundreds of newspaper and magazine articles to get the detailed information, and I sure don't have time to do that by myself.Read more ›
Most recent customer reviews
Ed Yourdon's most well-known recent work is probably TimeBomb 2000, a book that inspired so much unwarranted fear that one terrified couple on his Internet forum attempted to give... Read morePublished on April 24 2002
When I was introduced to Yourdon's Time Bomb 2000 in 1998, his predictions for impending doom got my attention. Read morePublished on April 10 2002 by Tech Reader
In his last book, TimeBomb 2000, Ed Yourdon stated that the Y2K phenomenon would be more pervasive and serious than anything we've experienced in modern history. Read morePublished on April 8 2002
Many people, Ed Yourdon and I included thought that January 1, 2000 represented a unique "point of discontinuity" that might start a chain of events that could cause major tremors... Read morePublished on April 8 2002 by Ken Orr
Many people, Ed Yourdon and I included, thought that January 1, 2000 represented a unique "point of discontinuity" that might start a chain of events that could cause major tremors... Read morePublished on April 7 2002 by Ken Orr
Provides the big picture as concerns IT post-September 11th. Implications and advice for policy makers, execs, IT workers, and interested citizens. Read morePublished on April 6 2002
This is essentially a rehash of other works as well as his previous Time Bomb 2000 book. If you're an IT professional, then you'll learn nothing new here. Read morePublished on April 6 2002
Yourdon was one of the Doom Lovers who predicted that Y2K was going to be The End Of The World As We Know It. It wasn't. Read morePublished on April 6 2002
Look for similar items by category
- Books > Computers & Technology > Computer Science > Software Engineering > Information Systems
- Books > Computers & Technology > History & Culture > Culture
- Books > Computers & Technology > Networking & Cloud Computing > Network Security
- Books > Computers & Technology > Programming > Software Design, Testing & Engineering > Software Development
- Books > Computers & Technology > Project Management > PMP Exam
- Books > Computers & Technology > Web Development > Programming > XML
- Books > Professional & Technical > Professional Science > Mathematics
- Books > Textbooks > Computer Science & Information Systems > Computer Science
- Books > Textbooks > Computer Science & Information Systems > Programming Languages