SlideShare una empresa de Scribd logo
1 de 21
All data collected from - http://code-hacker.wetpaint.com Software Blunders
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]

Más contenido relacionado

Similar a Software Blunders

Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureSrikanth KS
 
Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti IndustrialiGoWireless
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Julian Matthews
 
21 infamous & expensive software bugs
21 infamous & expensive software bugs21 infamous & expensive software bugs
21 infamous & expensive software bugs99tests
 
What is a quantum computerA quantum computer harnesses some of th.docx
What is a quantum computerA quantum computer harnesses some of th.docxWhat is a quantum computerA quantum computer harnesses some of th.docx
What is a quantum computerA quantum computer harnesses some of th.docxtroutmanboris
 
Write your thought on the following1. petroski notes that most en.pdf
Write your thought on the following1. petroski notes that most en.pdfWrite your thought on the following1. petroski notes that most en.pdf
Write your thought on the following1. petroski notes that most en.pdfarihantstoneart
 
Bem presentation London Envirosec 2008
Bem presentation London Envirosec 2008Bem presentation London Envirosec 2008
Bem presentation London Envirosec 2008Iphimedia LC
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwinJohan Klerk
 
computer-2.pptx the generation of computer slide.
computer-2.pptx the generation of computer slide.computer-2.pptx the generation of computer slide.
computer-2.pptx the generation of computer slide.santonaislam85
 
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...Shane Coughlan
 
Digital Infrastructure in a Carbon-Constrained World
Digital Infrastructure in a Carbon-Constrained WorldDigital Infrastructure in a Carbon-Constrained World
Digital Infrastructure in a Carbon-Constrained WorldLarry Smarr
 

Similar a Software Blunders (20)

Embedded systems The Past Present and the Future
Embedded systems The Past Present and the FutureEmbedded systems The Past Present and the Future
Embedded systems The Past Present and the Future
 
Satellite talk excerpts
Satellite talk excerpts Satellite talk excerpts
Satellite talk excerpts
 
Raoul Chiesa Hacking A Impianti Industriali
Raoul Chiesa   Hacking A Impianti IndustrialiRaoul Chiesa   Hacking A Impianti Industriali
Raoul Chiesa Hacking A Impianti Industriali
 
Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)Crisis Communications in the YouTube Age (updated)
Crisis Communications in the YouTube Age (updated)
 
Prelims
PrelimsPrelims
Prelims
 
21 infamous & expensive software bugs
21 infamous & expensive software bugs21 infamous & expensive software bugs
21 infamous & expensive software bugs
 
top 10 Data Mining Algorithms
top 10 Data Mining Algorithmstop 10 Data Mining Algorithms
top 10 Data Mining Algorithms
 
What is a quantum computerA quantum computer harnesses some of th.docx
What is a quantum computerA quantum computer harnesses some of th.docxWhat is a quantum computerA quantum computer harnesses some of th.docx
What is a quantum computerA quantum computer harnesses some of th.docx
 
Write your thought on the following1. petroski notes that most en.pdf
Write your thought on the following1. petroski notes that most en.pdfWrite your thought on the following1. petroski notes that most en.pdf
Write your thought on the following1. petroski notes that most en.pdf
 
The Future is Here: IT Prime Time
The Future is Here: IT Prime TimeThe Future is Here: IT Prime Time
The Future is Here: IT Prime Time
 
Bem presentation London Envirosec 2008
Bem presentation London Envirosec 2008Bem presentation London Envirosec 2008
Bem presentation London Envirosec 2008
 
2010 za con_barry_irwin
2010 za con_barry_irwin2010 za con_barry_irwin
2010 za con_barry_irwin
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
computer-2.pptx the generation of computer slide.
computer-2.pptx the generation of computer slide.computer-2.pptx the generation of computer slide.
computer-2.pptx the generation of computer slide.
 
Venture Summit 2014, Ron Reedy
Venture Summit 2014, Ron ReedyVenture Summit 2014, Ron Reedy
Venture Summit 2014, Ron Reedy
 
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...
From the Front Lines of Open Innovation: OpenRelief, OpenStreetMap and Openne...
 
D.Samyde
D.SamydeD.Samyde
D.Samyde
 
J-J.Quisquater
J-J.QuisquaterJ-J.Quisquater
J-J.Quisquater
 
Digital Infrastructure in a Carbon-Constrained World
Digital Infrastructure in a Carbon-Constrained WorldDigital Infrastructure in a Carbon-Constrained World
Digital Infrastructure in a Carbon-Constrained World
 
1950-1975
1950-19751950-1975
1950-1975
 

Software Blunders

  • 1. All data collected from - http://code-hacker.wetpaint.com Software Blunders
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.