330 likes | 347 Views
Outline of Unit 16: Realistic expectations. The digital computer, the success of the twentieth century Reaction to the rise of ICT What can go wrong with computer applications? What computers cannot do What computers should not do Ethics and computing.
E N D
Outline of Unit 16:Realistic expectations • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • What computers should not do • Ethics and computing Arab Open University - Riyadh
The digital computer, the success of the twentieth century The invisible computer. In the same way that electric motors have disappeared from our immediate awareness, computers – in the form of microprocessors and their associated sensors, actuators and displays – are embedded inside information appliances. Interesting tools: the hand-held personal GPS navigators. Massively Distributed Computing: The spare processing capacity of relatively small personal computers, when combined appropriately over a network, can be used to solve major problems.
Moore’s law • Gordon Moore, one of the founders of microprocessor manufacturer Intel and later its chairman, predicted in 1968 that he expected ‘a doubling of transistor density [...] every year’. • Since Intel sold its first microprocessors in 1971, the semiconductor industry has managed to double the number of transistors on a chip roughly every 18 months, right up to the present time.
Being driven to abstraction • Perhaps the most explicit example of abstraction and a ‘layered approach’ to managing complexity is the Open Systems Interconnection seven-layer model for handling the communication of information across networks.
OSI model Layers Layer 1. Physical Layer:Defines the physical [hardware level] implementation and the electrical [signal level] implementation of the bus; network cabling, connector type, pin-out, physical data rates, maximum transmission distances, and data transmission encoding. The material about OSI layers is additional (not from M150).
OSI model Layers Layer 2. Data Link layer:Frame format, transmitting frames over the net [additional bit/byte stuffing, start / stop flags, checksum, and CRC]. CAN bus, ATM, StarLAN, LocalTalk and HDLC are layer 2 protocols. Different network and protocol characteristics are defined by different data link layer specifications.
Layer 3. Network Layer:Provides address assignment, and packet's forwarding methods. Protocol Data Unit [PDU] is called a Packet at this layer. This layer responds to service requests from the Transport Layer and issues service requests to the Data Link Layer. OSI model Layers
Layer 4. Transport Layer:Provides transfer correctness, data recovery, and flow control. TCP is a layer 4 protocol. Protocol Data Unit [PDU] is called a Segment at this layer. This layer responds to service requests from the Session Layer and issues service requests to the Network Layer. OSI model Layers
Layer 5. Session Layer:Establishing a communication session, security, authentication. NetBIOS is a layer 5 protocol. Protocol Data Unit [PDU] is called Data at this layer. This layer responds to service requests from the Presentation Layer and issues service requests to the Transport Layer. OSI model Layers
Layer 6. Presentation Layer:Determines how computers represent data [ASCII, GIF..]. Protocol Data Unit [PDU] is called Data at this layer. This layer responds to service requests from the Application Layer and issues service requests to the Session Layer. OSI model Layers
Layer 7. Application Layer:The highest layer. Generates or interprets data, may also provide encryption or decryption. Applications using the network learn how to send a request, how to specify a filename over the net, how to respond to a request. OSI model Layers
Outline • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • What computers should not do • Ethics and computing
The responses of individuals The optimists:Respond in a wholly positive, enthusiastic way, seeing machines as freeing humans from drudgery as well as providing them with enhanced capabilities. The pessimists:For them, any use of computers is potentially negative. They think that technology will increase power of surveillance of individuals by the state or other powerful organisations. The realists:They are able to appreciate that the computer can act as a tool to enhance human activities but that it is limited in its potential by its (currently) digital nature and by our limitations in understanding our problems and ourselves.
Outline • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • What computers should not do • Ethics and computing
What can go wrong with computer applications? Dependence and risk Hardware failure Software crisis (the Y2K exemplary) Inadequate requirements Incorrect coding Infeasibility of testing
What can go wrong with computer applications? Inadequate models Over-maintained code: Every time changes are made to a system they are likely to add to the complexity of the system, to introduce new errors, and to make subsequent maintenance more difficult.
Inadequate requirements specification The Swing project This is how the customer explained it
This is how the project Leader understood it
Outline • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • What computers should not do • Ethics and computing
What computers cannot do Not everything is quantifiable Limitation on accuracy of representation Models are only approximations to reality Humans don’t work according to (explicit) rules Advanced e-thinking: computer playing chess. Can computers understand natural language?
Outline • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • Whatcomputers should not do • Ethics and computing
What computers should not do They should not: Remove humans from the control loop Replace human knowledge and experience Take the human role
Outline • The digital computer, the success of the twentieth century • Reaction to the rise of ICT • What can go wrong with computer applications? • What computers cannot do • What computers should not do • Ethics and computing
Ethics and computing Ethics in the context of ICT ‘Ten Commandments of Computer Ethics’ Terms of Service agreement Ethics and computing profession professional morality: commitment to public well-being. software development morality: commitment to ensuring quality in both process and product, arising from the adoption of ‘best practice’. The persuasive computer The Golden Rule of Persuasion: The creators of a persuasive technology should never seek to persuade a person or persons of something they themselves would not consent to be persuaded to do.