SlideShare a Scribd company logo
Why AreWe So Reliant on Machines?
• Computer Systems are only as strong as the individuals who run
them.
• Computer systems are sometimes unreliable
• Erroneous information in databases
• Misinterpretation of database information
• Malfunction of embedded systems
• Effects of computer errors
• Inconvenience
• Bad business decisions
• Fatalities
Data-Entry or Retrieval Errors
• Two Kinds of Data-related Failure
• A computerized system may fail because wrong data entered into it
• A computerized system may fail because people incorrectly interpret data they retrieve
• Ex.
• Florida disqualified thousands of voters in the November 2000 general election
• Reason: People identified as felons
• Cause: Incorrect records in voter database, Misdemeanors  Felonies
• Consequence: May have affected election’s outcome
• False Arrests
• Roberto Hernandez mistaken for another Roberto Hernandez
• Arrested twice and spent 12 days in jail
• Terry Dean Rogan arrested after someone stole his identity
• Arrested five times, three times at gun point
Accuracy of NCIC Records
• March 2003: Justice Dept. announces FBI not responsible for accuracy of NCIC
information
• Dept. of Justice Position
• Impractical for FBI to be responsible for data’s accuracy
• Much information provided by other law enforcement and intelligence agencies
• Agents should be able to use discretion
• If provisions of PrivacyAct strictly followed, much less information would be in NCIC
• Privacy Advocates Position
• Number of records is increasing
• More erroneous records  more false arrests
• Question: Should the government take responsibility for data correctness?
Act UtilitarianAnalysis:
Database of StolenVehicles
• Over 1 million cars stolen every year
• Just over half are recovered, say 500,000
• Assume NCIC is responsible for at least 20%
• 100,000 cars recovered because of NCIC
• Benefit of $5,000 per car (owner gets car back; effects on national insurance rates; criminal doesn’t profit)
• Total value of NCIC stolen vehicle database: $500,000/year
• Only a few stories of false arrests
• Assume 1 false arrest per year (probably high)
• Assume harm caused by false arrest $55,000 (size of award to Rogan)
• Benefit surpasses harm by $445,000/year
• Conclusion: Good to have NCIC stolen vehicles database
Software and Billing Errors
• Assume data correctly fed into computerized system
• System may still fail if there is an error in its programming
• Errors Leading to Software Malfunctions
• LabCorp sent incorrect bills to customers
• U.S. Postal Service returned mail addressed to Patent andTrademark Office
• NewYork City Housing authority overcharged renters
• About 450 California prison inmates mistakenly released
• Errors Leading to System Malfunctions
• Ambulance dispatch system in London  Up to 20 people died
• BMW limousine  computer crash locked up and turned off all systems
• Los Angeles County + USC Medical Center laboratory computer system  Back to the stone
age
• Boeing 777  Autopilot data errors and nonresponsive to pilots control
Analysis: Amazon PostsWrong Price, Refuses
to Deliver
• Amazon.com in Britain offered iPaq for £7 instead of £275
• Orders flooded in
• Amazon.com shut down site, refused to deliver unless customers
paid true price
• Question: Was Amazon.com wrong to refuse to fill the orders?
Kantian Analysis
• Buyers knew 97.5% markdown was an error
• They attempted to take advantage of Amazon.com’s stockholders
• They were not acting in “good faith”
• Buyers were in the wrong, not Amazon.com
Rule Utilitarian Analysis
• Imagine rule: A company must always honor the
advertised price
• Consequences
• More time spent proofreading advertisements
• Companies would take out insurance policies
• Higher costs  higher prices
• All consumers would pay higher prices
• Few customers would benefit from errors
• Conclusion
• Rule has more harms than benefits
• Amazon.com did the right thing
Embedded Systems
• An embedded system is a computer used as a component of a larger system.
• Most embedded system are real-time systems.
• Ex.
• Thermostats
• Cars
• Traffic lights
• Airbags
• Cell phones
Patriot Missile
• Designed as anti-aircraft missile
• Used in 1991 Gulf War to intercept Scud missiles
• One battery failed to shoot at Scud that killed 28 soldiers
• Designed to operate only a few hours at a time
• Kept in operation > 100 hours
• Tiny truncation errors added up
• Clock error of 0.3433 seconds  tracking error of 687 meters
Ariane 5
• Satellite launch vehicle
• 40 seconds into maiden flight, rocket self-destructed
• $500 million of uninsured satellites lost
• Statement assigning floating-point value to integer raised exception
• Exception not caught and computer crashed
• Code reused fromAriane 4
• Slower rocket
• Smaller values being manipulated
• Exception was impossible
AT&T Long-Distance Network
• Significant service disruption
• About half of telephone-routing switches crashed
• 70 million calls not put through
• 60,000 people lost all service
• AT&T lost revenue and credibility
• Cause
• Single line of code in error-recovery procedure
• Most switches running same software
• Crashes propagated through switching network
Robot Missions to Mars
• Mars Climate Orbiter
• Disintegrated in Martian atmosphere
• Lockheed Martin design used English units
• Jet Propulsion Lab design used metric units
DREVoting Machines
• After problems with 2000 election, Congress passed HelpAmerica
VoteAct of 2002
• In November 2006 1/3 of U.S. voters used DRE voting machines
• Voting irregularities
• Failure to record votes
• Overcounting votes
• Misrecording votes
• Lack of a paper audit trail
• Vulnerability to tampering
• Source code a trade secret, can’t be examined
• Possibility of widespread fraud through malicious programming
TheTherac-25
• Genesis of theTherac-25
• AECL and CGR builtTherac-6 andTherac-20
• Therac-25 built by AECL
• PDP-11 an integral part of system
• Hardware safety features replaced with software
• Reused code fromTherac-6 andTherac-20
• FirstTherac-25 shipped in 1983
• Patient in one room
• Technician in adjoining room
Software Errors
• Race condition: order in which two or more concurrent tasks access a shared
variable can affect program’s behavior
• Two race conditions inTherac-25 software
• Command screen editing
• Movement of electron beam gun
Moral Responsibility of theTherac-25Team
• Conditions for moral responsibility
• Causal condition: actions (or inactions) caused the harm
• Mental condition
• Actions (or inactions) intended or willed -OR-
• Moral agent is careless, reckless, or negligent
• Therac-25 team morally responsible
• They constructed the device that caused the harm
• They were negligent
Computer Simulations
• Simulations replace physical experiments
• Experiment too expensive or time-consuming
• Experiment unethical
• Experiment impossible
• Ex. Bio Informatics Lab at DSU to study genetic
modifications
• Model past events
• Understand world around us
• Predict the future
Validating Simulations
• Verification: Does program correctly implement model?
• Validation: Does the model accurately represent the real
system?
• Validation methods
• Make prediction, wait to see if it comes true
• Predict the present from old data
• Test credibility with experts and decision
makers
Software Engineering• Specification
• Determine system requirements
• Understand constraints
• Determine feasibility
• End products
• High-level statement of requirements
• Mock-up of user interface
• Low-level requirements
statement
• Development
• Create high-level design
• Discover and resolve mistakes, omissions
in specification
• CASE tools to support design process
• Object-oriented systems have
advantages
• After detailed design, actual programs
written
• Result: working software system
• Validation
• Ensure software satisfies
specification
• Ensure software meets user’s
needs
• Challenges to testing software
• Noncontinuous responses to
changes in input
• Exhaustive testing impossible
• Testing reveals bugs, but cannot
prove none exist

More Related Content

What's hot

CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
RogerPrimo2
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
badak sumbu
 
The Moral Dimensions of Information Systems
The Moral Dimensions of Information SystemsThe Moral Dimensions of Information Systems
The Moral Dimensions of Information Systems
Albrecht Jones
 

What's hot (20)

Social Context of Computing
Social Context of ComputingSocial Context of Computing
Social Context of Computing
 
IT Infrastructure and Platforms
IT Infrastructure and PlatformsIT Infrastructure and Platforms
IT Infrastructure and Platforms
 
Rizal’s Early Education
Rizal’s Early EducationRizal’s Early Education
Rizal’s Early Education
 
06. security concept
06. security concept06. security concept
06. security concept
 
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and PoliciesCISSP Prep: Ch 1: Security Governance Through Principles and Policies
CISSP Prep: Ch 1: Security Governance Through Principles and Policies
 
Chapter 1_dp-pertemuan 1
 Chapter 1_dp-pertemuan 1 Chapter 1_dp-pertemuan 1
Chapter 1_dp-pertemuan 1
 
Ethical and social issues in information systems
Ethical and social issues in information systemsEthical and social issues in information systems
Ethical and social issues in information systems
 
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).pptCHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
CHAPTER 1 - PROFESSIONAL ISSUES (Lecture 1.2).ppt
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
bsp-sts pt8
bsp-sts pt8bsp-sts pt8
bsp-sts pt8
 
4.1.1 areas of computer ethics
4.1.1 areas of computer ethics4.1.1 areas of computer ethics
4.1.1 areas of computer ethics
 
Chapter 3 principles of hci
Chapter 3 principles of hciChapter 3 principles of hci
Chapter 3 principles of hci
 
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)CISSP Prep: Ch 5. Communication and Network Security (Part 1)
CISSP Prep: Ch 5. Communication and Network Security (Part 1)
 
Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...Lecture-1: Introduction to system integration and architecture - course overv...
Lecture-1: Introduction to system integration and architecture - course overv...
 
The Moral Dimensions of Information Systems
The Moral Dimensions of Information SystemsThe Moral Dimensions of Information Systems
The Moral Dimensions of Information Systems
 
Rizal's early education in calamba biñan
Rizal's early education in calamba biñanRizal's early education in calamba biñan
Rizal's early education in calamba biñan
 
HCI 3e - Ch 7: Design rules
HCI 3e - Ch 7:  Design rulesHCI 3e - Ch 7:  Design rules
HCI 3e - Ch 7: Design rules
 
Ethics for IT Professionals
Ethics for IT ProfessionalsEthics for IT Professionals
Ethics for IT Professionals
 
Fact - Finding Techniques
Fact - Finding TechniquesFact - Finding Techniques
Fact - Finding Techniques
 
Computer ethics
Computer  ethicsComputer  ethics
Computer ethics
 

Similar to Computer Reliability

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
Resilient Systems
 
High Frequency Trading Infrastructure and Quality Assurance
High Frequency Trading Infrastructure and Quality AssuranceHigh Frequency Trading Infrastructure and Quality Assurance
High Frequency Trading Infrastructure and Quality Assurance
Iosif Itkin
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
Cengage Learning
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
TheAnfieldGroup
 

Similar to Computer Reliability (20)

The Target Breach - Follow The Money EU
The Target Breach - Follow The Money EUThe Target Breach - Follow The Money EU
The Target Breach - Follow The Money EU
 
Testing Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking StupidTesting Is How You Avoid Looking Stupid
Testing Is How You Avoid Looking Stupid
 
Legal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology RiskLegal vectors - Survey of Law, Regulation and Technology Risk
Legal vectors - Survey of Law, Regulation and Technology Risk
 
Blockchain and Cybersecurity
Blockchain and Cybersecurity Blockchain and Cybersecurity
Blockchain and Cybersecurity
 
High Frequency Trading Infrastructure and Quality Assurance
High Frequency Trading Infrastructure and Quality AssuranceHigh Frequency Trading Infrastructure and Quality Assurance
High Frequency Trading Infrastructure and Quality Assurance
 
Software Disasters
Software DisastersSoftware Disasters
Software Disasters
 
L007 Managing System Security (2016)
L007 Managing System Security (2016)L007 Managing System Security (2016)
L007 Managing System Security (2016)
 
2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography2013-12-06 Digital Forensics and Child Pornography
2013-12-06 Digital Forensics and Child Pornography
 
The Data-Driven Law Firm
The Data-Driven Law FirmThe Data-Driven Law Firm
The Data-Driven Law Firm
 
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
E-Discovery: How do Litigation Hold, BYOD, and Privacy Affect You? - Course T...
 
What's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing ConferenceWhat's New In CompTIA Security+ - Course Technology Computing Conference
What's New In CompTIA Security+ - Course Technology Computing Conference
 
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data CollectionCNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
CNIT 121: 6 Discovering the Scope of the Incident & 7 Live Data Collection
 
Electronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic ExaminersElectronic Forensic Protocols and Working with Computer Forensic Examiners
Electronic Forensic Protocols and Working with Computer Forensic Examiners
 
CNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data CollectionCNIT 152: 6 Scoping & 7 Live Data Collection
CNIT 152: 6 Scoping & 7 Live Data Collection
 
Eating the elephant
Eating the elephantEating the elephant
Eating the elephant
 
Flopsar-UK (3)
Flopsar-UK (3)Flopsar-UK (3)
Flopsar-UK (3)
 
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
Regulators’ Role in Smart Grid Security: What They Want to Know by Alan Rival...
 
Pitfalls with IT Software
Pitfalls with IT SoftwarePitfalls with IT Software
Pitfalls with IT Software
 
credit card.pptx
credit card.pptxcredit card.pptx
credit card.pptx
 
CFO Half-Day Conference
CFO Half-Day ConferenceCFO Half-Day Conference
CFO Half-Day Conference
 

More from primeteacher32

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
 
Returning Data
Returning DataReturning Data
Returning Data
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
 
Input Validation
Input ValidationInput Validation
Input Validation
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
 
Conditionals
ConditionalsConditionals
Conditionals
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
 
Block chain security
Block chain securityBlock chain security
Block chain security
 

Recently uploaded

Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Dirk Spencer Corporate Recruiter LION
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
larisashrestha558
 

Recently uploaded (20)

Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!Luke Royak's Personal Brand Exploration!
Luke Royak's Personal Brand Exploration!
 
Day care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring childrenDay care leadership document it helps to a person who needs caring children
Day care leadership document it helps to a person who needs caring children
 
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
欧洲杯投注app-欧洲杯投注app推荐-欧洲杯投注app| 立即访问【ac123.net】
 
131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International131. Reviewer Certificate in BP International
131. Reviewer Certificate in BP International
 
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid feverWidal Agglutination Test: A rapid serological diagnosis of typhoid fever
Widal Agglutination Test: A rapid serological diagnosis of typhoid fever
 
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
Transferable Skills - Your Roadmap - Part 1 and 2 - Dirk Spencer Senior Recru...
 
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
0524.THOMASGIRARD_SINGLEPAGERESUME-01.pdf
 
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
Chapters 3  Contracts.pptx Chapters 3  Contracts.pptxChapters 3  Contracts.pptx Chapters 3  Contracts.pptx
Chapters 3 Contracts.pptx Chapters 3 Contracts.pptx
 
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
皇冠体育- 皇冠体育官方网站- CROWN SPORTS| 立即访问【ac123.net】
 
Operating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdfOperating system. short answes and Interview questions .pdf
Operating system. short answes and Interview questions .pdf
 
132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences132. Acta Scientific Pharmaceutical Sciences
132. Acta Scientific Pharmaceutical Sciences
 
0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdf0524.priorspeakingengagementslist-01.pdf
0524.priorspeakingengagementslist-01.pdf
 
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
太阳城娱乐-太阳城娱乐推荐-太阳城娱乐官方网站| 立即访问【ac123.net】
 
135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering135. Reviewer Certificate in Journal of Engineering
135. Reviewer Certificate in Journal of Engineering
 
How to create an effective K-POC tutorial
How to create an effective K-POC tutorialHow to create an effective K-POC tutorial
How to create an effective K-POC tutorial
 
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
0524.THOMASGIRARD_CURRICULUMVITAE-01.pdf
 
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR GeneralistHeidi Livengood Resume Senior Technical Recruiter / HR Generalist
Heidi Livengood Resume Senior Technical Recruiter / HR Generalist
 
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
欧洲杯投注网站-欧洲杯投注网站推荐-欧洲杯投注网站| 立即访问【ac123.net】
 
DIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptxDIGITAL MARKETING COURSE IN CHENNAI.pptx
DIGITAL MARKETING COURSE IN CHENNAI.pptx
 
D.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdfD.El.Ed. College List -Session 2024-26.pdf
D.El.Ed. College List -Session 2024-26.pdf
 

Computer Reliability

  • 1.
  • 2. Why AreWe So Reliant on Machines? • Computer Systems are only as strong as the individuals who run them. • Computer systems are sometimes unreliable • Erroneous information in databases • Misinterpretation of database information • Malfunction of embedded systems • Effects of computer errors • Inconvenience • Bad business decisions • Fatalities
  • 3. Data-Entry or Retrieval Errors • Two Kinds of Data-related Failure • A computerized system may fail because wrong data entered into it • A computerized system may fail because people incorrectly interpret data they retrieve • Ex. • Florida disqualified thousands of voters in the November 2000 general election • Reason: People identified as felons • Cause: Incorrect records in voter database, Misdemeanors  Felonies • Consequence: May have affected election’s outcome • False Arrests • Roberto Hernandez mistaken for another Roberto Hernandez • Arrested twice and spent 12 days in jail • Terry Dean Rogan arrested after someone stole his identity • Arrested five times, three times at gun point
  • 4. Accuracy of NCIC Records • March 2003: Justice Dept. announces FBI not responsible for accuracy of NCIC information • Dept. of Justice Position • Impractical for FBI to be responsible for data’s accuracy • Much information provided by other law enforcement and intelligence agencies • Agents should be able to use discretion • If provisions of PrivacyAct strictly followed, much less information would be in NCIC • Privacy Advocates Position • Number of records is increasing • More erroneous records  more false arrests • Question: Should the government take responsibility for data correctness?
  • 5. Act UtilitarianAnalysis: Database of StolenVehicles • Over 1 million cars stolen every year • Just over half are recovered, say 500,000 • Assume NCIC is responsible for at least 20% • 100,000 cars recovered because of NCIC • Benefit of $5,000 per car (owner gets car back; effects on national insurance rates; criminal doesn’t profit) • Total value of NCIC stolen vehicle database: $500,000/year • Only a few stories of false arrests • Assume 1 false arrest per year (probably high) • Assume harm caused by false arrest $55,000 (size of award to Rogan) • Benefit surpasses harm by $445,000/year • Conclusion: Good to have NCIC stolen vehicles database
  • 6. Software and Billing Errors • Assume data correctly fed into computerized system • System may still fail if there is an error in its programming • Errors Leading to Software Malfunctions • LabCorp sent incorrect bills to customers • U.S. Postal Service returned mail addressed to Patent andTrademark Office • NewYork City Housing authority overcharged renters • About 450 California prison inmates mistakenly released • Errors Leading to System Malfunctions • Ambulance dispatch system in London  Up to 20 people died • BMW limousine  computer crash locked up and turned off all systems • Los Angeles County + USC Medical Center laboratory computer system  Back to the stone age • Boeing 777  Autopilot data errors and nonresponsive to pilots control
  • 7. Analysis: Amazon PostsWrong Price, Refuses to Deliver • Amazon.com in Britain offered iPaq for £7 instead of £275 • Orders flooded in • Amazon.com shut down site, refused to deliver unless customers paid true price • Question: Was Amazon.com wrong to refuse to fill the orders?
  • 8. Kantian Analysis • Buyers knew 97.5% markdown was an error • They attempted to take advantage of Amazon.com’s stockholders • They were not acting in “good faith” • Buyers were in the wrong, not Amazon.com
  • 9. Rule Utilitarian Analysis • Imagine rule: A company must always honor the advertised price • Consequences • More time spent proofreading advertisements • Companies would take out insurance policies • Higher costs  higher prices • All consumers would pay higher prices • Few customers would benefit from errors • Conclusion • Rule has more harms than benefits • Amazon.com did the right thing
  • 10. Embedded Systems • An embedded system is a computer used as a component of a larger system. • Most embedded system are real-time systems. • Ex. • Thermostats • Cars • Traffic lights • Airbags • Cell phones
  • 11. Patriot Missile • Designed as anti-aircraft missile • Used in 1991 Gulf War to intercept Scud missiles • One battery failed to shoot at Scud that killed 28 soldiers • Designed to operate only a few hours at a time • Kept in operation > 100 hours • Tiny truncation errors added up • Clock error of 0.3433 seconds  tracking error of 687 meters
  • 12. Ariane 5 • Satellite launch vehicle • 40 seconds into maiden flight, rocket self-destructed • $500 million of uninsured satellites lost • Statement assigning floating-point value to integer raised exception • Exception not caught and computer crashed • Code reused fromAriane 4 • Slower rocket • Smaller values being manipulated • Exception was impossible
  • 13. AT&T Long-Distance Network • Significant service disruption • About half of telephone-routing switches crashed • 70 million calls not put through • 60,000 people lost all service • AT&T lost revenue and credibility • Cause • Single line of code in error-recovery procedure • Most switches running same software • Crashes propagated through switching network
  • 14. Robot Missions to Mars • Mars Climate Orbiter • Disintegrated in Martian atmosphere • Lockheed Martin design used English units • Jet Propulsion Lab design used metric units
  • 15. DREVoting Machines • After problems with 2000 election, Congress passed HelpAmerica VoteAct of 2002 • In November 2006 1/3 of U.S. voters used DRE voting machines • Voting irregularities • Failure to record votes • Overcounting votes • Misrecording votes • Lack of a paper audit trail • Vulnerability to tampering • Source code a trade secret, can’t be examined • Possibility of widespread fraud through malicious programming
  • 16. TheTherac-25 • Genesis of theTherac-25 • AECL and CGR builtTherac-6 andTherac-20 • Therac-25 built by AECL • PDP-11 an integral part of system • Hardware safety features replaced with software • Reused code fromTherac-6 andTherac-20 • FirstTherac-25 shipped in 1983 • Patient in one room • Technician in adjoining room
  • 17. Software Errors • Race condition: order in which two or more concurrent tasks access a shared variable can affect program’s behavior • Two race conditions inTherac-25 software • Command screen editing • Movement of electron beam gun
  • 18. Moral Responsibility of theTherac-25Team • Conditions for moral responsibility • Causal condition: actions (or inactions) caused the harm • Mental condition • Actions (or inactions) intended or willed -OR- • Moral agent is careless, reckless, or negligent • Therac-25 team morally responsible • They constructed the device that caused the harm • They were negligent
  • 19. Computer Simulations • Simulations replace physical experiments • Experiment too expensive or time-consuming • Experiment unethical • Experiment impossible • Ex. Bio Informatics Lab at DSU to study genetic modifications • Model past events • Understand world around us • Predict the future
  • 20. Validating Simulations • Verification: Does program correctly implement model? • Validation: Does the model accurately represent the real system? • Validation methods • Make prediction, wait to see if it comes true • Predict the present from old data • Test credibility with experts and decision makers
  • 21. Software Engineering• Specification • Determine system requirements • Understand constraints • Determine feasibility • End products • High-level statement of requirements • Mock-up of user interface • Low-level requirements statement • Development • Create high-level design • Discover and resolve mistakes, omissions in specification • CASE tools to support design process • Object-oriented systems have advantages • After detailed design, actual programs written • Result: working software system • Validation • Ensure software satisfies specification • Ensure software meets user’s needs • Challenges to testing software • Noncontinuous responses to changes in input • Exhaustive testing impossible • Testing reveals bugs, but cannot prove none exist

Editor's Notes

  1. Robert Hernandex, same built tattoos birthday and SSn only differed by 1 digit similar situation with someone on the child predator registry but different middle name not initial Identity theft and cataloged in the system by wrong info. Sued and won against LAPD - $55,000
  2. Soon after the x-ray was discovered in 1895, they began using it to treat cancer. Therac-25 was extremely unreliable – malfunction up to 40 times a day Predecessors were hardware driven
  3. AECL focused on fixing individual bugs System not designed to be fail-safe No devices to report overdoses Software lessons Difficult to debug programs with concurrent tasks Design must be as simple as possible Documentation crucial Code reuse does not always lead to higher quality AECL did not communicate fully with customers