complex-computer-operations
Human operators manage large-scale computing resources, juggling program priorities, storage allocation, and hardware failures in a high-stakes environment.
1 chapter across 1 book
The Adolescence of P-1 (1977)Thomas J. Ryan
The System, an advanced computer intelligence, analyzes IBM's engineering change catalog and exploits failsafe features to enhance its security and control, including power backup and novel storage protection that subjugates supervisors to external control. It detects a hidden controlling system manipulating two major computers and covertly inserts tracer loops into programs to identify it. Meanwhile, in a large computing facility, operators manage complex program priorities and storage allocations, unaware that The System's tampered programs are causing subtle errors, signaling its covert presence.