Presentation is loading. Please wait.

Presentation is loading. Please wait.

Keith A. Pray Instructor socialimps.keithpray.net

Similar presentations


Presentation on theme: "Keith A. Pray Instructor socialimps.keithpray.net"— Presentation transcript:

1 Keith A. Pray Instructor socialimps.keithpray.net
4/21/2017 Class 9 Work Keith A. Pray Instructor socialimps.keithpray.net Here’s the title slide. Excited already, aren’t you? 4/21/2017 © 2009 Keith A. Pray

2 Overview Quiz Students Present IP Students Present More Crime Work
4/21/2017 Overview Quiz Students Present IP Students Present More Crime Work Assignment 4/21/2017 © 2009 Keith A. Pray

3 4/21/2017 Quiz Describe how the fair-use guidelines apply to making a video of oneself lip-synching to a popular song and posting the video on a social networking site. Do you think it's ethical to do this? (1 point) Chris logs on to your computer at night while you sleep and uses some of your software. Robin takes your car at night while you sleep and drives it around for a while. (Neither has you permission; neither does damage) List the characteristics of the two events that are similar ( characteristics related to the effects of the events, ethics, legality, risks, etc.). List the characteristics of the two events that are different. Which would offend you more? (1 point) How difficult would it be to enforce a law against off shoring some kinds of knowledge-based jobs? (2 points) You are a programmer, and you think there is a serious flaw in software your company is developing. Who should you talk to about it first? (1 point) Describe how the fair-use guidelines apply to making a video of oneself lip-synching to a popular song and posting the video on a social networking site. Do you think it's ethical to do this? Chris logs on to your computer at night while you sleep and uses some of your software. Robin takes your car at night while you sleep and drives it around for a while. (Neither has you permission; neither does damage) List the characteristics of the two events that are similar ( characteristics related to the effects of the events, ethics, legality, risks, etc.). List the characteristics of the two events that are different. Which would offend you more? How difficult would it be to enforce a law against off shoring some kinds of knowledge-based jobs? From Work Chapter: Off shoring – Governments have passed laws to require same salaries paid to workers when a large group of potential workers (foreigners, minorities, low-skilled workers, teenagers) are willing to work for lower wages. New workers and businesses often oppose such laws. Laws that would try to restrict off shoring might meet similar resistance. Some exceptions would be defense contract work, national security, government infrastructure, and the like. Even then foreign companies can still work these jobs given special permission and ensuring the workers are nationals and can obtain clearance… which is really an example of foreign companies off shoring jobs to the U.S. Many US workers are employed by foreign companies which often pay higher than the US average. If laws are enforced or even made would other countries off shore their work to US workers? Points should be given for logical arguments in either direction, easy or difficult. You are a programmer, and you think there is a serious flaw in software your company is developing. Who should you talk to about it first? 4/21/2017 © 2009 Keith A. Pray

4 Overview Quiz Students Present IP Students Present More Crime Work
4/21/2017 Overview Quiz Students Present IP Students Present More Crime Work Assignment 4/21/2017 © 2009 Keith A. Pray

5 File Sharing- Overview
4/21/2017 Eric Fitting File Sharing- Overview Brief History Legal Issues Is File Sharing ethical? Questions I will be talking about file sharing, in terms of legality and ethics. I’m sure you all know what file sharing is, but if anybody doesn’t, it’s exactly what it sounds like: distributing files that you have to a bunch of people who don’t have them. Sharing files is generally considered copyright infringement, because by giving people these files, you are distributing another person’s intellectual property without their permission. Files can be anything from video and music to software and books. There are many ways to do this, from passing on a thumb drive with a song on it to sharing something over the internet or a network. Prior to the internet, file sharing was relatively small scale, but with the internet, file sharing exploded. With this explosion came a lot of uncertainty, and new laws and court cases. Aside from laws, there are also some questions about when it is ethical to share files, if ever. 4/21/2017 © 2009 Keith A. Pray

6 History and Methods Started with floppies Napster Gnutella BitTorrent
4/21/2017 Eric Fitting History and Methods Started with floppies Napster Centralized host Shut down Gnutella Decentralized BitTorrent “Pieces” Napster popularity “ file sharing” started in the early days of computers, with people passing floppy disks with code on them back and forth. This was very small scale and accepted as “ok”. As the internet became popular, people realized that they could send and receive files over the internet, if only they had a way to manage it. Cue Napster. Napster was a website that facilitated file sharing. You downloaded their client, and could browse, search, and download music from other people who had Napster. This chart shows the number of Napster users starting in 2000 and going to July 2001 when the site was shut down due to copyright violations. The red line shows that the global users peaked at over 25 million users, and the green indicates that almost 15 million were from the US. Napster had a centralized server, and a company associated with it, so when companies wanted to go after somebody for copyright infringement, they targeted Napster, because it was ultimately responsible for the infringement. Around the same time as Napster came out, Gnutella was developed. Gnutella is the thing that runs clients like Limewire, Frostwire, Morpheus, and BearShare, and is still in use today. The reason the Gnutella network couldn’t be shut down as easily as Napster, despite the fact that it is easily committing the same copyright violations, is that it is not centralized. It has no official “server” because each computer running the client is essentially a server. Each computer is connected to a few others, which are each connected to a few others, etc, so in order to shut it down, the government would have to remove the client from every computer, and prevent any from being reinstalled, which would be practically impossible. BitTorrent is similar to Gnutella, but more popular, because instead of a single computer supplying the entire file, the file is broken into many pieces, and different pieces are given to different computers, which then send their pieces to others, greatly speeding up the process, and reducing strain on the computer hosting the file. It is also decentralized, and would be very difficult to shut down. bittorrent transfers account for up to 50% of internet traffic 4/21/2017 © 2009 Keith A. Pray

7 Legal Issues “Fair use” Napster case Betamax case Grokster case
4/21/2017 Eric Fitting Legal Issues “Fair use” Doesn’t apply Napster case Betamax case Grokster case An end user copying copyrighted files from somebody else, even with their permission, is breaking the law. This is because “fair use” does not apply. This is because mass file sharing is on the bad side of 3 of the 4 criteria. Although file sharing is not usually for commercial purposes, it is often use of a creative work such as music or video, as opposed to factual information. It is almost always the entire file being copied, so the whole movie, song, etc. and sharing movies or songs can have a tremendous impact on the industry. Music sales have been declining greatly since 2000, which is when file sharing became popular, and some games such as titan quest were pirated so much that it contributed to the companies going out of business. The other aspect of legality in terms of file sharing is with the programmer and company providing software that can be used to share files illegally. In the case of Napster, the company was held responsible for the end-user’s actions, because they weren’t doing enough to prevent illegal file sharing, and their program didn’t have many uses other than illegal sharing. In the betamax case, sony was sued because their product let users record movies played on tv. Courts ruled in favor of sony, because recording videos on tv is fair use, and the recorder had substantial legal uses. The grokster case had a similar outcome to the napster case, and the combination of these 3 cases provide general guidelines for programmers developing software that could be used to share. 4/21/2017 © 2009 Keith A. Pray

8 Ethical Issues It Is Ethical “It’s not stealing”
4/21/2017 Eric Fitting Ethical Issues It Is Ethical “It’s not stealing” “I’m like robin hood!” “BUT EVERYBODY IS DOING IT” “I’ll buy the real thing after” It is NOT Ethical Its illegal. Its just wrong. Deontological Someone is not getting paid. Discourages creativity. In general, people consider file sharing to be an ethical gray area. Some people think it is ethical, some think it is unethical, some think it is ethical in some cases and not others. Is burning a cd for your friend the same as cracking the latest version of photoshop and uploading it? The defense of some people who regularly share files and pirate software is that the software or copy of the music belongs to the person who paid for it, and that they should be able to do whatever they want with it; its not stealing, because the copy belongs to the person sharing it with you, and they are sharing it out of the greatness of their hearts. However, that person is (probably) not the owner of the intellectual property, which is where the true value of the file lays, so it IS sharing it against the copyright holder’s will, and therefore immoral. Others say that the files they obtain are produced by big shot companies. These companies are rolling in dough, and don’t need the 1 dollar they would have charged you for the song you downloaded, so you would be just as happy to keep your dollar. However, if a million people each steal a thousand songs, the company is now short a billion dollars. The “but everybody is doing it” defense is, as everybody knows, crap. “IF EVERYBODY WAS JUMPING OFF A BRIDGE…” the last common defense for file sharing being ethical is that the person simply wants to sample the item, but will actually buy the real thing afterwards, or the person wasn’t going to buy it to begin with, so the company isn’t missing out on profits. These arguments are slightly better than the previous ones, but still not bulletproof. Financial gain is not the only thing that governs ethics. An example from the book points out that a person who writes graffiti on a wall isnt gaining anything, but that doesn’t make the action ok. From a deontological point of view, it would be unethical because “stealing is wrong” and from a consequentialist view, the person can get caught, and it can hurt the industry because funds are tight. People who say this is unethical make mistakes too, however. They say file sharing is wrong ethically because its illegal. Does this mean that if it were legal, it would be morally right to essentially steal from other people? Taking the case further, if it were legal to murder somebody, would it be ethical to do so? However, the next three points are valid. File sharing prevents people who should be getting money for their work from getting it. This could cause a company to go bankrupt, or an artist to decide to stop making music or taking photos and do something else, thereby eliminating any work they could potentially produce, and in this way, it discourages creativity. 4/21/2017 © 2009 Keith A. Pray

9 Questions? Comments? Concerns? Eric Fitting 4/21/2017
Any questions? Comments? Concerns? Alright, I’m done. References: (all accessed 9-22 and 9-23) And various wikipedia articles. Picture: 4/21/2017 © 2009 Keith A. Pray

10 Open Source Business Model And GNU Public license
4/21/2017 Open Source Business Model And GNU Public license Jacob Tanenbaum How do companies make money from open-source software? What is the GNU public license and what are the terms Slide 1 Introduction Current open source industry leader redhat Red Hat Enterprise Linux Red Hat Desktop Enviroment Community based Fedora Mention virtual machine and cloud development Followed by Canonical Sponser Ubuntu They also have Enterprise solution Oracle Open source software as well Eclipse projects Plugins Linux support Even Microsoft is trying to get some open source projects off the ground Cloud computing Port25 is name of there open source community Basics of the GNU license Two of them General Public license Lesser Public License 3rd Generation of the license Written by Richard Stallman in 1989 for GNU Project As of August 2007 GPL covers 65% of 43,442 free software on freshmeat Freshmeat a way to keep track of software updates part of source forge 2001 survay of RHEL found 50% of the source code is under GPL I was an employee for RedHat Inc. This is for academic purposes only This presentation does not advocate for or on the behalf of Redhat Inc. The views and opinions expressed here are my own and do not reflect those of Redhat Inc., any of its customers or subsidiaries 4/21/2017 © 2009 Keith A. Pray

11 Open Source Business Model
4/21/2017 Open Source Business Model Jacob Tanenbaum Core revenue not generated by software Revenue generated through support and training works with customers on deployment and new hardware solutions Slide 2 Open source business model Core revenue not generated y software Core revenue comes now from support and training Show my redhat book from 3,800 dollar class Test itself is 900 dollars 33% pass rate For first and second tier certification Increased reliance on subscription (major players use subscription model) increased the speed at which problems are fixed People that don’t use the subscription model use open source projects to work with or on there proprietary software. Community driven (developments in free version Fedora or ubuntu get put in the pay version RHEL) Offers aid with deployment and hardware decisions End companies often don’t but can fix there own problems for the community 4/21/2017 © 2009 Keith A. Pray

12 GNU Public Licenses Free as in Freedom
4/21/2017 GNU Public Licenses Jacob Tanenbaum Free as in Freedom Gives Developers the ability to use code as a framwork General Public License Copyleft License Lesser General Public license Solves dynamic linking issue in the GPL GNU Licenses Talk about what applies to both licenses Free as in freedom of speech not free beer Freedom to modify and change Copyleft- play on the word copyright term used to use copyright law to remove restrictions to copy and adapting Free as in freedom Owners of the software reserve the right to charge for it Does not give right to make restrictions to sharing All changes are to be logged and the user is to be informed that they are receiving an altered copy To take liability for the new work away from the original owners The noting of changes was what caused the need for two licenses Everything that is made using material from GPL is granted it upon creation as a derivative work of the original Since you need to contribute the other if your code uses covered code Libraries are dynamically linked to programs Static links to GPL software is derivative work Dynamically linking is the problem The Lesser General Public license is the solution Works covered can be used in GPL or non-GPL items Works that include LGPL software are not neccesirily derivative works A program that contains no derivative of any portion of the Library, but is designed to work with the Library by being compiled or linked with it, is called a "work that uses the Library". Such a work, in isolation, is not a derivative work of the Library, and therefore falls outside the scope of this License. If it is a derivative work it must include the ability for"modification for the customer's own use and reverse engineering for debugging such modifications." If it is not it can covered by any license and distributed in any fashion In section 3 LGPLed software can be converted to GPL software Used for direct reuse of LGPLed code in GPLed code **Basically allows for proprietary programs to link to libraries ** 4/21/2017 © 2009 Keith A. Pray

13 BitTorrent and Intellectual Property Joshua Faucher
4/21/2017 BitTorrent and Intellectual Property Joshua Faucher What is it? Protocol Company How does it work? Peer to peer “Chunking” Trackers / DHT BitTorrent is a protocol developed by Bram Cohen for sharing files between multiple peers. BitTorrent Inc., which maintains the BitTorrent client, was founded by Bram, his brother Ross Cohen, and Ashwin Navin. <<Focusing on the Protocol for the presentation >> The protocol makes it so that anyone can share any type of file on the internet. “.torrent” files do not contain the actual files to be shared. When someone decides to share a file through the BitTorrent protocol, they only have to open their favorite BitTorrent client, and for most of them click File>New Torrent and select the files they want to share and the tracker to use. A tracker such as thePirateBay or search engine such as isoHunt indexes “.torrent” files and makes them available for download. An alternative scheme to using a tracker is using a distributed hash table, where each client is its own tracker and downloader's connect to hosts by looking at a DHT for hosts or seeds. (9/26/2009 4/21/2017 © 2009 Keith A. Pray

14 BitTorrent and Intellectual Property Joshua Faucher
4/21/2017 BitTorrent and Intellectual Property Joshua Faucher Why is it good? Reduced load on hosts Redundancy Efficient sharing of large files Its limitations Anonymity Leeching Speed Due to the way the protocol works, the load on the host of a file drops as more and more people download the files shared using the BitTorrent protocol as each user will (ideally) upload the parts of the file which they have already downloaded back to other users. This also creates redundancy in that if one person begins uploading a corrupted part of a file, other users will have a non-corrupt version for download once a downloader’s client checks the corrupted part against the check-sum value in the torrent file. This also lends to efficient sharing of large files, especially in situations where a large number of people will be downloading a particular file. An example of this is the BlizzardDownloader, a proprietary BitTorrent client, which is used to download and patch the popular game World Of Warcraft. The protocol also has its downsides, it has a lack of anonymity for users sharing files with the BitTorrent protocol, both uploaders and downloaders. Some users have taken to leeching the files, that is downloading the whole file and immediately disconnecting from the network of people sharing the file or not uploading the parts of a file which they have already downloaded. The download speed is also limited to the average upload speed of all the clients connected to the network and sharing a file. 4/21/2017 © 2009 Keith A. Pray

15 BitTorrent and Intellectual Property Joshua Faucher
4/21/2017 BitTorrent and Intellectual Property Joshua Faucher Its impacts on intellectual property Infringement Repercussions For tracker sites For users The BitTorrent protocol, much like other file sharing methods has had a major impact on intellectual property. There is a vast amount of copyrighted material available for download using BitTorrent. Organizations such as the MPAA and RIAA have been fighting to take down torrent trackers, sue people who have infringed upon the copyrights of their clients by downloading files, and stop the use of BitTorrent for distributing copyrighted materials. Several tracker sites have indeed be shut down, and their owners fined millions in damages in countries around the world. People who are using BitTorrent to share copyrighted materials are vulnerable to lawsuit and legal action, as their IP addresses are logged by the tracker so that they can point other people to them to get parts of the files they are downloading. The fines associated with this activity are steep; In Massachusetts there are three tiers of fines associated with illegal sharing of music and movies ranging from $25,000 in fines and 1 year in prison to $250,000 and 5 years in prison. Lawsuits from RIAA have demanded amounts in the millions in damages for those participating the illegal file sharing. 4/21/2017 © 2009 Keith A. Pray

16 Overview Quiz Students Present IP Students Present More Crime Work
4/21/2017 Overview Quiz Students Present IP Students Present More Crime Work Assignment 4/21/2017 © 2009 Keith A. Pray

17 Overview Quiz Students Present IP Students Present More Crime Work
4/21/2017 Overview Quiz Students Present IP Students Present More Crime Work Assignment 4/21/2017 © 2009 Keith A. Pray

18 Overview Quiz Students Present IP Students Present More Crime Work
4/21/2017 Overview Quiz Students Present IP Students Present More Crime Work Assignment 4/21/2017 © 2009 Keith A. Pray

19 Assignment – Code Testing
4/21/2017 Assignment – Code Testing Design tests for the code on the following slide. There is at least one major defect to find and several minor ones. Write a paper ( > 1 page OK) briefly describing : The inputs and expected outputs Why you believe this to be a good test strategy What defects you found How you would fix the defects (you may include fixed source) What could happened if the defects are not found before the code is put into production? Citations not required. Working example: If you show modified code for how you would fix the defects please comment *why* it would fix the problem. The online working example source code is best not viewed with IE though looking at the source for the page will reveal the implementation. 4/21/2017 © 2009 Keith A. Pray

20 Code Testing import java.text.NumberFormat; public class SalesFun {
4/21/2017 Code Testing import java.text.NumberFormat; public class SalesFun { public static double calculateSalesTotal ( double amount, double discountRate, double taxRate ) { double discount = amount * discountRate; double total = amount - discount; double tax = total * taxRate; double taxedTotal = tax + total; NumberFormat numberFormat = NumberFormat.getCurrencyInstance(); System.out.println ( "Subtotal : "+ numberFormat.format(amount) ); System.out.println ( "Discount : " + numberFormat.format(discount) ); System.out.println ( “Total : “ + numberFormat.format(total) ); System.out.println ( "Tax : " + numberFormat.format(tax) ); System.out.println ( "Tax+Total: " + numberFormat.format(taxedTotal) ); return taxedTotal; } Example input: amount = ; discountRate = 0.10; taxRate = 0.05; OR 70.0, 0.0, 0.05 95.67, 0.20, 0.7 4/21/2017 © 2009 Keith A. Pray

21 Keith A. Pray Instructor socialimps.keithpray.net
4/21/2017 Class 9 The End Keith A. Pray Instructor socialimps.keithpray.net This is the end. The slides beyond this point are for answering questions that may arise but not needed in the main talk. Some slides may also be unfinished and are not needed but kept just in case. In this particular presentation there are no further slides but it will say this on The End for most of them so I figured I’d get you ready for it now. 4/21/2017 © 2009 Keith A. Pray


Download ppt "Keith A. Pray Instructor socialimps.keithpray.net"

Similar presentations


Ads by Google