+ All Categories
Home > Documents > 1. Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3...

1. Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3...

Date post: 25-Dec-2015
Category:
Upload: joleen-mcbride
View: 214 times
Download: 0 times
Share this document with a friend
Popular Tags:
70
Ethics – Set 2 1
Transcript
Page 1: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Ethics – Set 2

1

Page 2: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Steps in ◦ Free try on inettest Algorithms test◦ Study CSILM’s on csilm.usu.edu => CS3◦ Fill out CSILM survey on survey monkey◦ Attend Algorithms review◦ Take Algorithms test◦ Fill out CSILM survey on survey monkey◦ 5 points added to score on Ethics test

2

CSILM

Page 3: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

We, as computer scientists, have the following basic areas of concern◦ Obligation for safe, functional products◦ Management & control of information Acquisition – how do I get it? Access – who can use it? Stewardship – how should I protect it

and keep it accurate?

3

Ethical Concerns

Page 4: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

What type of information will be gathered and stored, and how will it be collected◦ Should the student database include your

SS#?◦ Why not just get the student’s name and then

go to another database, e.g. government, and look up their social security number?

◦ Why do we collect your age?◦ For Aggie card users, should we collect

purchase information? How would we use it?

4

Ethical Concerns - Examples

Page 5: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Who will have access Should we sell information we collect? Do we own it, or do you own it? How will information be protected from

unauthorized access◦ Am I responsible if someone illegally accesses

it, or changes it How will accuracy be maintained

◦ Do I have to verify its accuracy when collected? Who is responsible?

5

Ethical Concerns - Information

Page 6: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

How do companies protect their software?◦Nondisclosure agreements Prevents employees from leaving and using what they know

◦Copyrights◦Patents

6

Software Ownership

Page 7: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Copyrights and patents can inhibit standards◦Visicalc was not copyrighted or patented

Taiwan is not a signatore of the Berne Convention

7

Software Ownership

Page 8: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

◦Copyright Raises question of “look & feel” Reverse Engineering Apple once tried to sue Microsoft for “copying” windows Apple had copied from Xerox

8

Software Ownership

Page 9: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

International◦Different countries have different philosophies on patents and copyrightse.g. Japan encourages diffusion of knowledge for greater good

9

Software Ownership

Page 10: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Worker loss (hiring away) Ignorance

◦“mailing” of NetTestCase History – IBM Fujitsu

◦“IBM isn’t the opposition, it’s the environment”

Mid 1990’s, software piracy = ~$7B

10

Software Ownership - Problems

Page 11: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Question – As a company, what is the best way to protect your software?◦NEVER give access to source (Microsoft)

What does this do to the competition?◦WP & DLL naming conventions (load it first or load it second)

11

Software Ownership

Page 12: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Is it really free? Is it ethical to make something free today

with the intention of charging for it in the future?

12

Free Software

Page 13: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Piracy Break-ins

◦Includes Spam Sabotage Different states have different laws

◦In Virginia, it’s a crime to alter the return address of an unsolicited e-mail How do you enforce this law?

13

Computer Crime

Page 14: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Viruses, worms, etc.◦First Internet worm created by a Cornell graduate student – shut down several company networks

Hackers, intruders◦Sabotage◦Challenge

Use of system for illegal benefit Denial of service

14

Computer Crime

Page 15: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

~10 port scans of USU/day◦That’s a scan of all “boxes” at USU (there are hundreds)

◦Most common approach is to do a TCIP connection to port 21 and look at the ftp server information (is it up to date, etc.)

What is the life span of an “unprotected” box at USU is ????

15

USU Security

Page 16: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

One Hour

16

USU Security

Page 17: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Tent.usu.edu monitors outgoing attacks Dumpster.usu.edu monitors incoming

attacks Real question is what defines an attack

◦Network managers must “tune” these systems to define an attack.

◦If hackers get this information, can tune their attack to go undetected

17

USU Security

Page 18: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

You’re building a database system which will have information about individuals. To meet your ethical responsibilities, what security measures should you implement? ◦Access control◦Preservation of system and data integrity

◦Provide for recovery and backup ability

18

Ethics - Security

Page 19: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Companies have a moral and legal obligation to maintain security◦DNA information◦Health records

Question◦When you get a ticket, your insurance company is notified (or finds out) and raises your rate. Is this ok?

19

Ethics - Security

Page 20: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Should I put a GPS device in every new car sold?

20

Moral Issue

Page 21: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Technology is now in use in mission critical systems◦Hospital◦Airplane/airport

Hardware reliability◦Redundancy◦Intel & the Pentium bug

21

Ethics –Reliability/Liability

Page 22: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Who is liable?◦Company that wrote software◦Computer scientist◦User beware?◦In networked environments, is CompuServe liable for libelous material posted on a bulletin board?

22

Ethics –Reliability/Liability

Page 23: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

According to Aristotle◦We are responsible for voluntary actions but not involuntary ones

◦Involuntary actions Performed under compulsion The result of ignorance

23

Ethics – Responsibility

Page 24: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Ignorance is excusable when through no fault of the person’s, one is ignorant of the circumstances or consequences of an action

Ignorance is not excusable if that ignorance is the result of carelessness or neglect or it is deliberately willed

Ignorance in the eyes of the law is no excuse

24

Ethics – Ignorance

Page 25: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

PM software marketed a product for project management

Market growth and share had been declining

Competitor was rumored to be coming out with a new product

Needed/wanted to know about new product

25

Acquisition of Information Competitive Analysis at PM Software

Page 26: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

If you were with this company and your boss told you to find out about the product, how would you do it?

26

Acquisition of Information Competitive Analysis at PM Software

Page 27: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Develop a database of repair information for all of the trucks in the fleet

What are the ramifications of this action?◦Good◦bad

27

Acquisition of InformationFranklin Trucking

Page 28: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Once type & scope of information to be collected is determined, must decide on who has access.

What is an individual’s right to privacy? – to be left alone (Supreme court rule)

Does information gathered from a purchase belong to the company? – It has value so why isn’t the consumer compensated?

28

Information Access

Page 29: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

More and more, companies are using micromarketing – targeting their advertising to specific groups.

Example◦A company wants to offer special prices on meals at a restaurant Is there some place or way to target my advertising? Name some

29

Information Access

Page 30: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Public sources◦Computerized real estate record◦DMV records (some states sell these)

Generated by commercial transactions◦Telephone, mail order, rebate coupons, …

30

Information Sources

Page 31: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Johnson & Johnson ran a promotion giving away a female product. All people had to do was call or write. What J&J did not tell was that they were compiling a database of these people, and were marketing this database to other health product companies

OK?

31

Information Sources

Page 32: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Stewardship involves◦Protecting information from unauthorized access

◦Keeping information as up to date as possible

◦Keeping information accurate If a company sells data, do they have a responsibility as to whom they sell it?

32

Information Stewardship

Page 33: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Wasn’t until after WWII that credit rating companies came into existence

There are now only 3◦ TRW(Experian), Equifax, Trans Union

In addition to credit information, they are becoming more value added, e.g. software has been developed to give a recommendation of whether or not to grant a loan

33

Information Stewardship

Page 34: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

A 1998 study by the Public Interest Research Group found that 29% of credit reports contained errors that could result in the denial of credit (defined as false delinquencies, or reports listing accounts or public records that did not belong to the consumer).

34

Credit Reports

Page 35: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The study also found that 41% of reports had incorrect demographic identifying information, and 20% were missing major credit cards, loans, or mortgages.

In total, 70% of reports contained an error of some kind.

35

Credit Reports

Page 36: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

In 1999 Consumer reports analyzed 1500 randomly selected credit reports

What do you think was the error rate?

43% had errors

36

Credit Reports

Page 37: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

What is the most “sensitive” information maintained on you?

Physicians’ Computer Network weekly interrogates patient files of several thousand doctors for medication information. It sells this data to pharmaceutical companies

37

Information Accuracy

Page 38: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Disgruntled consultant◦Called in at 11:00 and told to leave by noon

◦Had just completed a major software project and the software was on his system waiting to be uploaded

◦To work longer hours, company allowed him access to system from home

38

Computer Security & Crimes

Page 39: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Bank to receive software had been told that it was complete

Consultant took home only backup copy of software

When consultant got home, he logged into system and added “bugs” to software, then erased any log files for this work

39

Computer Security & Crimes

Page 40: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

When company ran final test on software, it did not work

What went wrong at this company?

Who was liable?

40

Computer Security & Crimes

Page 41: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Student is told by a professor that the University’s payroll system cannot be accessed without authorization

Student takes 4 hours one evening and accesses the payroll file, but then is so tired he simply logs off and goes to bed

41

Computer Security & Crimes

Page 42: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

University arrests studentStudent confesses and even tells how to fix security hole

What should be done to the student?

42

Computer Security & Crimes

Page 43: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Therac-25 radiation therapy machine

Developed by a Canadian Government corporation – Atomic Energy of Canada

Therac – 25 was an extension of the Therac-20, with computer control added

43

Liability, Safety, and Reliability

Page 44: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Operated in two modes◦X-ray for internal or deep cancers High intensity electron beam is

deflected by a special tungsten target to give proper level of radiation

◦Electron Tungsten element removed and

intensity reduced for skin lesions

44

Therac-25

Page 45: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The Therac-20 had mechanical interlocks for safety

All safety for the Therac-25 was included in the assembly language software

Error messages were cryptic and usually meant nothing – just being cautious

45

Therac-25

Page 46: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The basic problem with the therac was that the two modes could get mixed and thus give a high dose without the shield – initially could not be detected

1985 – ◦woman receives overdose◦Company informed but no steps taken

◦Woman sues, but settled out of court

◦Sound familiar? 46

Therac-25

Page 47: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Next month, man receives overdose, and dies, but cause of death was cancer

AECL determines that problem is in the turntable switch and “fixes” it – announces◦New solution indicates an improvement over the old system by at least “5 orders of magnitude”

◦In truth they did not know the problem cause 47

Therac-25

Page 48: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

AECL told other users that they should not use their machines until new software was delivered◦Did not tell any users of deaths or accidents

Responsibilities?

48

Therac-25

Page 49: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Intel is known as a company with a bunker like mentality

Pentium introduced in 1983October 1994 error shown4159835-

((4195835/3145727)*3145727 = 256

Intel knew about flaw in summer

49

Pentium

Page 50: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Intel refused to replace chips except for those customers that “passed” a questionnaire

Claimed for “average” user error would occur every 27,000 years

IBM claimed error would occur every 24 days

December 12– IBM announces will stop shipping faulty chips (Power PC)

December 20 Intel says will replace all

50

Pentium

Page 51: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Microsoft announced Chicago (Windows 95) long before it was ready◦ IBM’s PS/2 was a major competitor

To “lock” market share, IBM announced System/360, even though several models in the line were not available until 2 years later◦ At the time, Honeywell, among others, had

faster systems for less money

51

Vaporware

Page 52: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

AutomationProductivityNew industriesComputerization of the workplace◦Networking◦Travel◦The new “workplace” – safety, etc.

52

Social Issues

Page 53: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Free speech in Cyberspace◦Surveillance

Who owns your e-mail?When can your computer’s files be accessed?

Universal access vs limited access

53

Social Issues

Page 54: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Quality of lifeUse of powerRisks and reliabilityProperty rightsPrivacyEquity & accessHonesty and deception

54

Ethical Issues

Page 55: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Open Source

55

Page 56: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The pricing of software bears no relationship to the cost of its development. The two factors that do matter are:◦ market size (which is limited by price and utility)◦ competition.

Given a market for a software product, the maximum margin can be obtained by precluding or eliminating competition.

56

Software Pricing

Page 57: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Software companies that are able to thwart competition attain pinnacles of power which are inconceivable in other industries.

Example?

57

Software Pricing

Page 58: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Partly this is due to the enormous cash flows that are possible in the absence of competition from products with nil reproduction costs

Largely it is due to the complexity of software itself, which allows dominant companies to design “standards” which exclude future competition.

58

Software Pricing

Page 59: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Stands for GNU’s not Unix Started in 1983 by Richard Stallman at MIT

AI Laboratory It’s really GNU/Linux – started to again

make software free Mostly maintained through donations of

time and material

59

GNU

Page 60: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

A Unix-like operating system is much more than a kernel; ◦ Includes compilers, editors, text formatters,

mail software, and many other things. ◦ Thus, writing a whole operating system is a

very large job. We started in January 1984. It took many years. The Free Software Foundation was founded in October 1985, initially to raise funds to help develop GNU.

60

GNU

Page 61: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Restricting copying is not the only basis for business in software.

It is the most common basis because it brings in the most money. If it were prohibited, or rejected by the customer, software business would move to other bases of organization which are now used less often. There are always numerous ways to organize any kind of business.

61

Part of GNU Manifesto

Page 62: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Probably programming will not be as lucrative on the new basis as it is now. But that is not an argument against the change. It is not considered an injustice that sales clerks make the salaries that they now do. If programmers made the same, that would not be an injustice either. (In practice they would still make considerably more than that.)

62

Part of GNU Manifesto

Page 63: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

“We maintain this free software definition to show clearly what must be true about a particular software program for it to be considered free software.”

``Free software'' is a matter of liberty, not price. To understand the concept, you should think of ``free'' as in ``free speech,'' not as in ``free beer.''

63

Free Software Foundation

Page 64: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Free software is a matter of the users' freedom to run, copy, distribute, study, change and improve the software.

In this definition, non-free software is software that you can’t change, extend, etc.

More precisely, it refers to four kinds of freedom, for the users of the software:

64

Free Software

Page 65: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The freedom to run the program, for any purpose (freedom 0).

The freedom to study how the program works, and adapt it to your needs (freedom 1). Access to the source code is a precondition for this.

The freedom to redistribute copies so you can help your neighbor (freedom 2).

65

Free Software

Page 66: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

The freedom to improve the program, and release your improvements to the public, so that the whole community benefits (freedom 3). Access to the source code is a precondition for this.

66

Free Software

Page 67: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

A program is free software if users have all of these freedoms.

Thus, you should be free to redistribute copies, either with or without modifications, either gratis or charging a fee for distribution, to anyone anywhere.

Being free to do these things means (among other things) that you do not have to ask or pay for permission.

67

Free Software

Page 68: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Copylefted software is free software whose distribution terms ensure that all copies of all versions are free software.

Copyleft says that anyone who redistributes the software, with or without changes, must pass along the freedom to further copy and change it. Copyleft guarantees that every user has freedom.

68

Copylefted Software

Page 69: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Open Source is a definition of how software is to be distributed (sold) – Technically there can be differences between open source and free software

In some cases, people call open source software that has some licensing restrictions that don’t fit the “free” model

69

Open Source Software

Page 70: 1.  Steps in ◦ Free try on inettest Algorithms test ◦ Study CSILM’s on csilm.usu.edu => CS3 ◦ Fill out CSILM survey on survey monkey ◦ Attend Algorithms.

Is free software free?◦ Can I sell you a piece of “free” software?◦ What happens if you “own” a piece of free

software that you need to change? You can do whatever you want to it Who do you get to make those

changes?

Cost of Ownership


Recommended