<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jjhernan</id>
	<title>Expertiza_Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.expertiza.ncsu.edu/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jjhernan"/>
	<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=Special:Contributions/Jjhernan"/>
	<updated>2026-05-16T06:11:49Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.41.0</generator>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2169</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2169"/>
		<updated>2007-08-06T10:01:40Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: Improve on the study guide some more.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
====History====&lt;br /&gt;
Joseph Mangan, a former employee of TTTech Computertechnik, blew the whistle on Airbus and TTTech regarding the safety of the cabin pressure system on the Airbus A380 aircraft in September 2004 by contacting the European Aviation Safety Agency (EASA). TTTech supplies some components to Airbus for the A380, and has been accused by Mangan of &amp;quot;intentional non-compliance&amp;quot; with aviation safety rules, at least partially because they were under great pressure from Airbus to meet deadlines.&lt;br /&gt;
&lt;br /&gt;
Mangan claimed that a flaw existed in the outflow valve control system, which uses TTTech controllers, that could result in a sudden loss of air pressure in the cabin. Such a loss of air pressure would result in passengers quickly losing consciousness, with other possible health consequences. One of the primary concerns generated by this claim was the lack of different backup systems to prevent the same problem from affecting all the valves at the same time.&lt;br /&gt;
&lt;br /&gt;
====Results of the Whistleblowing====&lt;br /&gt;
Airbus and TTTech both denied there was a problem - TTTech went further by accusing Mangan of being a disgruntled ex-employee trying to get revenge. The EASA found that TTTech was not in compliance with safety rules and was not conducting appropriate tests, and the microchip at the heart of the controversy was deemed unacceptable: in the end EASA told Airbus to resolve the problem before the A380's final certification.&lt;br /&gt;
&lt;br /&gt;
Within a few days of reporting the suspected violations at TTTech, Mangan was fired and sued for defamation. TTTech also obtained a gag order, which Mangan then violated. Many of Mangan's difficulties stem from the lack of Austrian laws protecting whistle-blowers from retribution by their employers. Mangan has tried to get a new job, but has not been able to get a response from companies in the aerospace industry.&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csl.sri.com/users/neumann/air.html Computer Security in Aviation: Vulnerabilities, Threats, and Risks]&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://sunnyday.mit.edu/papers/smcit.doc Fault Protection in a Component-Based Spacecraft Architecture]&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki The Fatal-Flaw Myth]&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print Airbus Moves to Rewire Its Management First]&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.csmonitor.com/2006/0711/p03s04-usgn.html On space station, droids get a workout]&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.mobilemag.com/content/100/103/C8827/ Anti-hijack software controls planes from the ground]&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.avweb.com/eletter/archives/avflash/465-full.html#190603 Pilots Battle Computer For Control Of 777]&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1 B747-400 Electronic flight displays rendered inoperative]&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1 Flight Control System Software Anomalies]&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.cmu.edu/PR/releases06/060228_cellphone.html Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed]&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.spectrum.ieee.org/print/3069 Unsafe At Any Airspeed?]&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1 Tests show cell phones don't disrupt navigation systems]&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software  Airworthiness Directive]&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1 UK Defense software standard]&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://catless.ncl.ac.uk/Risks/16.16.html#subj3 Summary of safety-critical computers in transport aircraft]&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[http://satc.gsfc.nasa.gov/assure/nss8719_13.html SOFTWARE SAFETY NASA TECHNICAL STANDARD]&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Study Guide==&lt;br /&gt;
&lt;br /&gt;
===Code requirements/standards===&lt;br /&gt;
&lt;br /&gt;
To what kinds of requirements should aviation software be held? The United Kingdom Department of Defense has a set of requirements for software used in military aircraft. The Federal Aviation Administration has many guidelines for writing and reviewing code, while NASA has recommended metrics to ensure adherence to specifications.&lt;br /&gt;
&lt;br /&gt;
* There are controversial code requirements from various government agencies, such as this standard from the UK Department of Defense.&lt;br /&gt;
* The FAA has quite a few documents with suggested practices on writing and reviewing code for airborne systems.&lt;br /&gt;
* NASA recommends using metrics during software development, but especially during the requirements phase. The report claims that the cost benefits of finding and correcting problems in the requirements phase is 14 times better than not doing so.&lt;br /&gt;
* The adoption of accepted software development standards like [http://www.sei.cmu.edu/cmm/ CMM] and [http://www.managementhelp.org/quality/iso9000/iso9000.htm ISO9000] could help the aviation companies achieve better quality procedures and checkpoints.&lt;br /&gt;
* Training could help developers to analyze and research quality issues with a plane early in the development phase.&lt;br /&gt;
* Regular 3rd party audits on the products, maintenance, and operations can be conducted in a regular basis to assure the customers that the company and management are doing all they can to maintain the best level of quality as efficient as possible.&lt;br /&gt;
&lt;br /&gt;
===Analyzing/Testing Code===&lt;br /&gt;
&lt;br /&gt;
What kinds of analyzing and testing should be done on aviation software? The United Kingdom military believes that static code analysis is the answer. There are groups that are trying to standardize the software safety procedures.&lt;br /&gt;
&lt;br /&gt;
* A study of static code analysis to evaluate UK military avionics software. This involves studying the source code in the editor, which will hold true under all conditions.&lt;br /&gt;
* The Certification Authorities Software Team (CAST) is an international group promoting standardization of certification and regulatory positions on software and complex electronic hardware aspects of safety.&lt;br /&gt;
* A study and analysis of currently used software industry quality practices should be periodically conducted and improved upon by the individuals and the company. &lt;br /&gt;
&lt;br /&gt;
===Organizations and Standards===&lt;br /&gt;
&lt;br /&gt;
What kinds of laws and enforcement should be available to the company, employee, industry, and government to assure that the safety of the passengers is always first? It is important that secondary oversight is present to maintain a certain level of quality and safety within the industry. What other types of oversights would help maintain quality and safety standards?&lt;br /&gt;
&lt;br /&gt;
* An Industry standard and committee should be formed consisting of different companies and individuals to organize and study audits, incidents, and new safety operating procedures.&lt;br /&gt;
* Election of outside professionals and involved company representatives work together to improve safety in the industry.&lt;br /&gt;
* Laws to police and enforce safety of products should be developed and suggested to the government to protect the unfair treatment of individuals when communicating quality issues are ignored by the company, and most importantly management.&lt;br /&gt;
&lt;br /&gt;
===Portable electronic devices===&lt;br /&gt;
&lt;br /&gt;
Are passengers' electronic devices dangerous on planes? The prevailing studies show that the amount of radiation from these devices is potentially, and many incidents of aviation software malfunction demonstrate this. No plane crashes have been attributed to onboard electronic devices yet.&lt;br /&gt;
&lt;br /&gt;
* This report by the House shows incidents of interference and details some restrictions put in place.&lt;br /&gt;
* A study shows that portable electronic devices can disrupt normal operation of key cockpit instruments, especially Global Positioning System (GPS) receivers. Private studies show that people are illicitly using cellphones on planes and that current levels of in-flight radio frequency emissions can be dangerous. On the other hand, this post cites a study claiming cell phones don't disrupt flight systems.&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2086</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2086"/>
		<updated>2007-08-03T00:11:22Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki, The New Yorker&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.nytimes.com/2006/10/13/business/worldbusiness/13airbus.html?ei=5088&amp;amp;en=9c624e9920538fcd&amp;amp;ex=1318392000&amp;amp;partner=rssnyt&amp;amp;pagewanted=print&amp;quot;&amp;gt;&lt;br /&gt;
    Airbus Moves to Rewire Its Management First&amp;lt;/a&amp;gt;&lt;br /&gt;
    By MARK LANDLER, The New York Times&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2084</id>
		<title>CSC 379:Week 5, Group 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_5,_Group_1&amp;diff=2084"/>
		<updated>2007-08-02T23:56:53Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Airbus 380 Software Flaw=&lt;br /&gt;
'''Provide an overview of this ethical controversy and links to information relevant for each set of ethical concerns cited.'''&lt;br /&gt;
&lt;br /&gt;
'''Cover information contained in both articles:'''&lt;br /&gt;
* [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
* [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Included below are two excerpts that give an overview of the content of this topic:'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mr Mangan claims a defect in the outflow valve control system could lead to an abrupt loss of cabin pressure, leaving passengers unconscious in as little as 20 seconds. &amp;quot;Normal oxygen masks don't work properly above 33,000 feet. Anybody over forty or over-weight is at a high risk of embolisms,&amp;quot; he said.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Airbus dismissed fears about the A380 as baseless. &amp;quot;We have examined this internally and found absolutely no reason to be concerned. The scenario made up by Mr Mangan does not exist,&amp;quot; said spokesman David Voskuhl.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech falsely classified its micro-chip as a simple &amp;quot;off-the-shelf&amp;quot; product already used in car valves in order to except it from elaborate testing rules, he claimed. This would breach both EU and US law on aircraft regulation. &amp;quot;I refused to sign off on the test results, but TTTech went ahead anyway,&amp;quot; he claimed.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;TTTech denies the allegations, calling him a disgruntled ex-employee who never fitted into the team, and is now bent on revenge.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://www.telegraph.co.uk/money/main.jhtml?xml=/money/2005/10/15/ccairb15.xml Telegraph.co.uk]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Most passenger jets have two cabin-pressure valves, with separate motors operating each. But because aircraft makers want redundancy on safety systems the planes have three motors for each valve, with different chips controlling each motor. [...] Most jetliners also have a manual override so that the pilot can take control in an emergency. [...] The company elected to go with four outflow valves on the A380, with only one motor on each valve, which are slightly larger than a cabin window. Each motor uses a TTTech controller chip, and there is no backup manual-override system.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Mangan says the European aerospace establishment is whitewashing his claims because of enormous cost savings that will be realized if TTTech's chips are approved for the A380. &lt;br /&gt;
TTTech's chip originally was designed for use in autos and the company is trying to get it certified as an existing, &amp;quot;commercial off-the-shelf&amp;quot; product that is acceptable for the A380, according to court records.&lt;br /&gt;
Mangan, however, alleges that the chip is being customized for aviation purposes, and thus must undergo stringent testing before being approved by regulators.&lt;br /&gt;
If regulators decide that TTTech's chip is a simple commercial device and can be used in the A380, it would then be available for other new aircraft without having to pass costly safety reviews.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Source: [http://seattletimes.nwsource.com/html/boeingaerospace/2002534201_airbuswhistleblower02.html Seattle Times]&lt;br /&gt;
&lt;br /&gt;
==Table of Contents==&lt;br /&gt;
&amp;lt;h3&amp;gt;General&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csl.sri.com/users/neumann/air.html&amp;quot;&amp;gt;&lt;br /&gt;
    Computer Security in Aviation: Vulnerabilities, Threats, and Risks&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter G. Neumann &amp;lt;em&amp;gt;SRI Computer Science Laboratory&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://sunnyday.mit.edu/papers/smcit.doc&amp;quot;&amp;gt;&lt;br /&gt;
     Fault Protection in a Component-Based Spacecraft Architecture&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Elwin C. Ong and Nancy G. Leveson &amp;lt;em&amp;gt;MIT&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;!--&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.ece.cmu.edu/%7Ekoopman/des_s99/sw_reliability/#concepts&amp;quot;&amp;gt;&lt;br /&gt;
    Software Reliability&amp;lt;/a&amp;gt;&lt;br /&gt;
    Jiantao Pan &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;--&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Conflicting Views&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.newyorker.com/archive/2006/07/31/060731ta_talk_surowiecki&amp;quot;&amp;gt;&lt;br /&gt;
    The Fatal-Flaw Myth&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Financial Page by James Surowiecki&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;New uses of software&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.csmonitor.com/2006/0711/p03s04-usgn.html&amp;quot;&amp;gt;&lt;br /&gt;
    On space station, droids get a workout&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter N. Spotts &amp;lt;em&amp;gt;Christian Science Monitor&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.mobilemag.com/content/100/103/C8827/&amp;quot;&amp;gt;&lt;br /&gt;
    Anti-hijack software controls planes from the ground&amp;lt;/a&amp;gt;&lt;br /&gt;
    T.O. Whenham &amp;lt;em&amp;gt;Mobile Magazine&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Software Malfunctions&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.avweb.com/eletter/archives/avflash/465-full.html#190603&amp;quot;&amp;gt;&lt;br /&gt;
    Pilots Battle Computer For Control Of 777&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    The AVweb Editorial Staff &amp;lt;em&amp;gt;AVweb&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.12.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    B747-400 Electronic flight displays rendered inoperative&amp;lt;/a&amp;gt;&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/24.03.html#subj3.1&amp;quot;&amp;gt;&lt;br /&gt;
    Flight Control System Software Anomalies&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Ladkin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Effects of portable electronic devices&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.cmu.edu/PR/releases06/060228_cellphone.html&amp;quot;&amp;gt;&lt;br /&gt;
    Carnegie Mellon Researchers Find Cell Phones Pose Greater Risk to Airplane Navigation Than Previously Believed&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;Carnegie Mellon University&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.spectrum.ieee.org/print/3069&amp;quot;&amp;gt;&lt;br /&gt;
    Unsafe At Any Airspeed?&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;IEEE&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.house.gov/transportation/aviation/hearing/07-20-00/07-20-00memo.html&amp;quot;&amp;gt;&lt;br /&gt;
    Portable Electronic Devices: Do they really pose a safey hazard on aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
    The Subcommittee on Aviation &amp;lt;em&amp;gt;U.S. House of Representatives&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/23.54.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    Tests show cell phones don't disrupt navigation systems&amp;lt;/a&amp;gt;&lt;br /&gt;
    NewsScan &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation%20safety.php_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h3&amp;gt;Aviation standards&amp;lt;/h3&amp;gt;&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://www.airweb.faa.gov/Regulatory_and_Guidance_Library/rgAD.nsf/0/94171A756992D0408625708300551865?OpenDocument&amp;amp;amp;Highlight=software&amp;quot;&amp;gt;&lt;br /&gt;
    Airworthiness Directive&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
     &amp;lt;em&amp;gt;FAA&amp;lt;/em&amp;gt; &amp;lt;img src=&amp;quot;Aviation_safety_files/new.gif&amp;quot;&amp;gt;&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/9.01.html#subj2.1&amp;quot;&amp;gt;&lt;br /&gt;
    UK Defense software standard&amp;lt;/a&amp;gt;&lt;br /&gt;
    Sean Matthews &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://catless.ncl.ac.uk/Risks/16.16.html#subj3&amp;quot;&amp;gt;&lt;br /&gt;
    Summary of safety-critical computers in transport aircraft&amp;lt;/a&amp;gt;&lt;br /&gt;
&lt;br /&gt;
    Peter B. Lankin &amp;lt;em&amp;gt;The RISKS Digest&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;&amp;lt;a href=&amp;quot;http://satc.gsfc.nasa.gov/assure/nss8719_13.html&amp;quot;&amp;gt;&lt;br /&gt;
    SOFTWARE SAFETY NASA TECHNICAL STANDARD&amp;lt;/a&amp;gt;&lt;br /&gt;
     &amp;lt;em&amp;gt;NASA&amp;lt;/em&amp;gt; &amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1988</id>
		<title>CSC 379:Week 4, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1988"/>
		<updated>2007-07-30T13:37:48Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level (see links below), more people have become concerned about how invasive to their privacy public photography can be. Amongst many lawful and beneficial uses, mapping technologies have also made it easier for planning crimes.&lt;br /&gt;
&lt;br /&gt;
==Google Mapping Technology== &lt;br /&gt;
&lt;br /&gt;
On the surface the Google Mapping Technology seems like a useful service, but at what cost? Just recently the White House requested that parts of the Washington D.C. area be censored for security and privacy issues. This could be said for other institutions and individuals concerned with their privacy. &lt;br /&gt;
&lt;br /&gt;
===Ethical implications of mapping technologies===&lt;br /&gt;
&lt;br /&gt;
====Privacy====&lt;br /&gt;
The houses of celebrities, government officials, and co-workers will be compromised by anyone wanting to spy or monitor for some personal gain or benefit. On the other hand, I could search and see a map of the neighborhood I used to live in when I was a kid or what route to take when traveling to another state.&lt;br /&gt;
&lt;br /&gt;
====Security====&lt;br /&gt;
This is related to privacy and could be targeted to delinquent planning to steal house or business valuables. At the same time a snapshot can be used as evidence that a certain individual was trespassing or spying on someone.&lt;br /&gt;
&lt;br /&gt;
====Legal====&lt;br /&gt;
Some countries, states, national parks/monuments, or key locations may have laws against taking photographs. On the other hand it would be neat to see how the NC zoo is organized and how crowded it is at times from a Google snapshot.&lt;br /&gt;
&lt;br /&gt;
====Aproved/Unaproved Use====&lt;br /&gt;
Unapproved use of Google map resources and features will require and cost Google resources to submit a cease and desist request. Approved use of Google services and features will bring new sources of revenue and business opportunities. &lt;br /&gt;
&lt;br /&gt;
====Insecure Technology====&lt;br /&gt;
Security exploits to the new technologies used by Google will or may negatively affect the company and any of its users. If the technologies prove useful, other companies will evaluate and adopt similar technology and development practice.&lt;br /&gt;
&lt;br /&gt;
====Emerging Google Map Features====&lt;br /&gt;
The click-to-call feature can be useful at times if I forget my dentist's phone number. I can &amp;quot;Google Map&amp;quot; to it and click the building to auto dial the Dentist's phone number. The issues with these new add-on features to the Google Map services is that they will append to the already mounting ethical issues of privacy and security of a company or individual. &lt;br /&gt;
*[http://www.google.com/help/faq_clicktocall.html Click-to-call Feature]&lt;br /&gt;
&lt;br /&gt;
===Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?===  &lt;br /&gt;
&lt;br /&gt;
This is a nice Google service feature if used with the right intent, to look up directions and routes to a company (for example). For the moment this feature has proved beneficial to the company and its users. The problem is that they did not take into consideration security and privacy issues from the beginning to assure that the rights of people or countries are supported as specified by their laws. From the point of view of competition asking for permission for every map location would have proven too costly to release. From this point of view it is understandable why the service was released this way. If anyone has a problem or conflict with the provided maps they should request they are removed from the Service like the White House did.&lt;br /&gt;
&lt;br /&gt;
===Are requests for censorship of public photography ethical?===&lt;br /&gt;
&lt;br /&gt;
Requests from censorship of public photography has the same issues (or even more) of Photojournalism. Publishing these public photos for some journalistic intent has produced some controversy. Good journalist organizations have had the time to develop some ethical standards. Other issues have not been resolved, like the abuse of celebrity privacy from the paparazzi.  &lt;br /&gt;
&lt;br /&gt;
===As mapping imagery increases in coverage and resolution over time, should there be limits set or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?===&lt;br /&gt;
&lt;br /&gt;
We would all like to thing that there would be some limits set by our respected officials and public representatives. The problem is that we have not done this censorship in similar situations as described in the previous question. Unfortunately these limits may vary from different countries and organizations that will not be effective.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Street View==&lt;br /&gt;
&lt;br /&gt;
===Overview===&lt;br /&gt;
&lt;br /&gt;
Google recently launched a new tool called &amp;quot;Street View&amp;quot;, which allowed users to view street-level images of selected major cities in the US. Although such images are legal, many claim that  posting them on the internet without consent or any apparent censorship violates their privacy.&lt;br /&gt;
&lt;br /&gt;
===Concerns about Lack of Censorship===&lt;br /&gt;
&lt;br /&gt;
One of the largest concerns among critics of Street View is that Google made no effort to censor peoples' faces or license plate numbers, so individuals and their vehicles are easily identifiable to whoever views the images. Also, these photographs were taken without first making people aware that they were about the be photographed. Many say this is unethical because it takes away a person's choice to be viewable by millions and also has the potential to catch some people in embarrassing or unfavorable situations. For example, photographs have been found of individuals whose faces are easily visible getting arrested, sunbathing nude and urinating on the side of a road.&lt;br /&gt;
&lt;br /&gt;
Critics argue against this point, stating that all of these things could be seen by people simply driving down the street in their normal lives. Public photography is neither new nor illegal in the US. Also, Google has stated that there's a system in place that allows users to flag inappropriate or sensitive imagery for review to be removed. Critics point out that someone should not be engaging in embarrassing activity in public unless they're prepared to have the public see them doing it. Also, Google has said that they understand peoples' privacy concerns in some areas, such as photographing peoples' children, and say that they are putting loose restrictions on what may be flagged for review to help accommodate for those concerns. Google stated that it avoided photographing anonymous organizations such as women's refuge and drug rehabilitation centers.&lt;br /&gt;
&lt;br /&gt;
===Concerns about Stalking===&lt;br /&gt;
&lt;br /&gt;
Some argue that this technology can be used to stalk individuals, however this argument most often stems from the erroneous assumption that the photos are updated in real-time, which they're not. They're simply snapshots of a moment in time weeks or months prior and can't be used to ascertain a person's location at any particular moment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;br /&gt;
* [http://www.mcwetboy.net/maproom/2007/06/google_street_v.php Privacy Concerns Raised about Google Street View (Maproom)]&lt;br /&gt;
* [http://mashable.com/2007/05/31/top-15-google-street-view-sightings/ A Collection of Notable Sightings found with Google Street View (Mashable)]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1883</id>
		<title>CSC 379:Week 4, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1883"/>
		<updated>2007-07-26T22:50:25Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level (see links below), more people have become concerned about how invasive to their privacy public photography can be. Amongst many lawful and beneficial uses, mapping technologies have also made it easier for planning crimes.&lt;br /&gt;
&lt;br /&gt;
==Google Mapping Technology== &lt;br /&gt;
&lt;br /&gt;
===Ethical implications of mapping technologies===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?===  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Are requests for censorship of public photography ethical?  When? === &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===As mapping imagery increases in coverage and resolution over time, should there be limits set or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Emerging Google Map Features===&lt;br /&gt;
*[http://www.google.com/help/faq_clicktocall.html Click-to-call Feature]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Street View==&lt;br /&gt;
&lt;br /&gt;
Ethical implications of mapping technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are requests for censorship of public photography ethical?  When?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As mapping imagery increases in coverage and resolution over time, should there be limits set or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1882</id>
		<title>CSC 379:Week 4, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_4,_Group_5&amp;diff=1882"/>
		<updated>2007-07-26T22:38:06Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Mapping / Google Street View=&lt;br /&gt;
Many are concerned about the invasiveness of satellite/aerospace imaging.  Governments have complained of risks related to the availability of images of sensitive military or strategic sites, sometimes requesting obfuscation or blackouts of the compromising images.  With the expansion of mapping technologies to the street level (see links below), more people have become concerned about how invasive to their privacy public photography can be. Amongst many lawful and beneficial uses, mapping technologies have also made it easier for planning crimes.&lt;br /&gt;
&lt;br /&gt;
==Mapping== &lt;br /&gt;
&lt;br /&gt;
Ethical implications of mapping technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are requests for censorship of public photography ethical?  When?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As mapping imagery increases in coverage and resolution over time, should there be limits set or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Google Street View==&lt;br /&gt;
&lt;br /&gt;
Ethical implications of mapping technologies&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Should mapping technologies comply with the laws of every country that has access their services even if they are not located there?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Are requests for censorship of public photography ethical?  When?  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As mapping imagery increases in coverage and resolution over time, should there be limits set or censorship mandated to protect the public from lawful but invasive and sometimes unwanted photography?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Resources==&lt;br /&gt;
===Relevant External Links:===&lt;br /&gt;
* [http://www.nytimes.com/2007/06/01/technology/01private.html Google Zooms In Too Close for Some (New York Times)] &lt;br /&gt;
* [http://www.boingboing.net/2007/06/05/google_street_view_a.html Public Opinion on Google Street View (Boing Boing)]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1746</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1746"/>
		<updated>2007-07-18T11:06:13Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. In simple terms, a project licensed with the GPL can be freely distributed and charged for, but any and all distribution must provide the source code to the consumer as well.  Also, according to the GPL, any work which uses code licensed by the GPL must license itself with the GPL.  It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPL - Version 1.0, February 1989&lt;br /&gt;
** To guarantee the freedoms to share and change free software.&lt;br /&gt;
** To make sure the software is free for all its users.&lt;br /&gt;
* GPL - Version 2.0, June 1991&lt;br /&gt;
** Further restricted rights from Version 1.0&lt;br /&gt;
** Updated to cover distribution of the program or programs as a whole.&lt;br /&gt;
** Linux kernel released under this license version&lt;br /&gt;
* GPL - Version 3.0, January 2006&lt;br /&gt;
** Further restricted rights from Version 2.0&lt;br /&gt;
** Updated to the cohort the ability to make changes to software and to compel for changes to be distributed so everyone benefits from the intellectual energy used to make changes.&lt;br /&gt;
** Main purpose, the abolition of DRM as a social practice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
In general GPL software will impact certain groups, companies, or organizations differently and others in the same manner. &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! Impact On:&lt;br /&gt;
! Positive:&lt;br /&gt;
! Negative:&lt;br /&gt;
|- &lt;br /&gt;
| Personal Software Users&lt;br /&gt;
| The reduced monetary cost to acquire and use of software to achieve a personal task or action. No need to hack a commercial licensed product if a free version is available and easy to use. &lt;br /&gt;
| The learning curve and time to evaluate the software and its stability. In most cases GPL software lack proper documentation or specific key features. Although we can look at the code, we may be ignorant to the intentions of the programs and the community that created it.&lt;br /&gt;
|-&lt;br /&gt;
| Developers - Open Source&lt;br /&gt;
| To encourage evolution of software without having to re-invent the wheel. To continue and encourage the open source movement. &lt;br /&gt;
| An unwelcome change of a supporting program feature will generate chatter and distractions and delays from the ultimate goals of the developed system. A breach of commercial copyright laws by the application or supporting programs.&lt;br /&gt;
|-&lt;br /&gt;
| Developers – Commercial&lt;br /&gt;
| Developer can investigate and analyze already used and solved approaches to a problem and their core issues. Temptations caused by cost and times lines constraints may lead to illegal use of GPL code in commercial systems.&lt;br /&gt;
| Alternative free version of application is already available and free to users meaning that creating similar commercial version of the program will have to achieve higher appeal to justify its cost.&lt;br /&gt;
|-&lt;br /&gt;
| Commercial Software Companies&lt;br /&gt;
| Companies may be able to replace commercial software with open source counterparts to save money and increase profits. A good example of this is replacing their internal bug tracking system from a costly commercial one to bugzilla.&lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Non-profit organizations&lt;br /&gt;
| A community may be experienced and willing to provide a good solution or product to keep the operating cost down.&lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Government&lt;br /&gt;
| The Government may be able to replace commercial software with open source counterparts to save money. Encourage others to use GLP software. &lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Education and Research&lt;br /&gt;
| A community may be experienced and willing to provide guidance for students and researchers to analyze and learn how to solve certain types of problems or tasks.&lt;br /&gt;
| The student or researcher will have to spend extra time learning and understanding a developed strategy of the program or source code is poorly written and no documentation is available for it.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
The main ethical issue with a license requiring the acceptance of the most recent version is that it forces the user to sign a contract which has not been written yet.  While the user could agree with the current version, a future version may change in such a fashion as to restrict the liberties of the user beyond what they would agree to.  This setup provides a large amount of leverage and power to the writers of the new versions of the license because they can force a huge tree of people into new agreements.  If a small, but widely used section of code was licensed under the GPL and the new version required additional profit restrictions, it would affect every project which used that code, as well as the projects which used those projects ect.  At the same time, if the license is changed in such a way that it benefits the users then that too can affect a large group.  The main ethical issue is the amount of power given to the writers of the license and how it is used.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;br /&gt;
&lt;br /&gt;
According to the patent sharing/protection agreement, Microsoft will collaborate Novell to support SuSe Linux as an alternative deployment platform to Windows. The partnership is said to make it easier for users to run both Windows and Linux-based systems and according to Microsoft CEO, Steve Ballmer, is said to &amp;quot;bridge the divide between open-source and proprietary source software&amp;quot; [http://news.com.com/Microsoft+makes+Linux+pact+with+Novell/2100-1016_3-6132119.html Microsoft make Linux pact with Novell.]&lt;br /&gt;
&lt;br /&gt;
Although the agreement is beneficial to both companies and its customers, it does raise some ethical concerns. Novell's open source software is under the GPL license which requires software to be distributed and modified freely but under the Microsoft/Novell agreement a royalty is being paid.&lt;br /&gt;
In another sense it almost seems like Microsoft has bought out Novell. Although sources say the agreement won't affect [http://news.com.com/Novell+sues+Microsoft+for+sinking+WordPerfect/2100-1012_3-5450285.html Novell's antitrust suit against Microsoft], it is somewhat hard to believe that two companies collaborating together would be suing one another. Infact, under the agreement Microsoft promised not to file patent suits against developers creating code for SuSe. Perhaps Microsoft hopes this will encourage Novell to drop their suit.&lt;br /&gt;
&lt;br /&gt;
Another ethical issues arising out of the agreement is that of loyalty, or for that matter, lack there of. The open source community has never been fond of Microsoft and Novell is build on software developed by the open source community. This has angered a large part of the open source community and [http://techp.org/petition/show/1 &amp;quot;in short, now that Novell has chosen not to hang together with the Free Software community, they've chosen not to do so with them.&amp;quot;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Main Links '''&lt;br /&gt;
* [http://www.gnu.org gnu.org]&lt;br /&gt;
* [http://www.opensource.org opensource.org]&lt;br /&gt;
* [http://www.fsf.org/ FreeSoftwareFoundation.org]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1721</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1721"/>
		<updated>2007-07-16T12:08:19Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. In simple terms, a project licensed with the GPL can be freely distributed and charged for, but any and all distribution must provide the source code to the consumer as well.  Also, according to the GPL, any work which uses code licensed by the GPL must license itself with the GPL.  It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPL - Version 1.0, February 1989&lt;br /&gt;
** To guarantee the freedoms to share and change free software.&lt;br /&gt;
** To make sure the software is free for all its users.&lt;br /&gt;
* GPL - Version 2.0, June 1991&lt;br /&gt;
** Further restricted rights from Version 1.0&lt;br /&gt;
** Updated to cover distribution of the program or programs as a whole.&lt;br /&gt;
** Linux kernel released under this license version&lt;br /&gt;
* GPL - Version 3.0, January 2006&lt;br /&gt;
** Further restricted rights from Version 2.0&lt;br /&gt;
** Updated to the cohort the ability to make changes to software and to compel for changes to be distributed so everyone benefits from the intellectual energy used to make changes.&lt;br /&gt;
** Main purpose, the abolition of DRM as a social practice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
In general GPL software will impact certain groups, companies, or organizations differently and others in the same manner. &lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! Impact On:&lt;br /&gt;
! Positive:&lt;br /&gt;
! Negative:&lt;br /&gt;
|- &lt;br /&gt;
| Personal Software Users&lt;br /&gt;
| The reduced monetary cost to acquire and use of software to achieve a personal task or action. No need to hack a commercial licensed product if a free version is available and easy to use. &lt;br /&gt;
| The learning curve and time to evaluate the software and its stability. In most cases GPL software lack proper documentation or specific key features. Although we can look at the code, we may be ignorant to the intentions of the programs and the community that created it.&lt;br /&gt;
|-&lt;br /&gt;
| Developers - Open Source&lt;br /&gt;
| To encourage evolution of software without having to re-invent the wheel. To continue and encourage the open source movement. &lt;br /&gt;
| An unwelcome change of a supporting program feature will generate chatter and distractions and delays from the ultimate goals of the developed system. A breach of commercial copyright laws by the application or supporting programs.&lt;br /&gt;
|-&lt;br /&gt;
| Developers – Commercial&lt;br /&gt;
| Developer can investigate and analyze already used and solved approaches to a problem and their core issues. Temptations caused by cost and times lines constraints may lead to illegal use of GPL code in commercial systems.&lt;br /&gt;
| Alternative free version of application is already available and free to users meaning that creating similar commercial version of the program will have to achieve higher appeal to justify its cost.&lt;br /&gt;
|-&lt;br /&gt;
| Commercial Software Companies&lt;br /&gt;
| Companies may be able to replace commercial software with open source counterparts to save money and increase profits. A good example of this is replacing their internal bug tracking system from a costly commercial one to bugzilla.&lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Non-profit organizations&lt;br /&gt;
| A community may be experienced and willing to provide a good solution or product to keep the operating cost down.&lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Government&lt;br /&gt;
| The Government may be able to replace commercial software with open source counterparts to save money. Encourage others to use GLP software. &lt;br /&gt;
| Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
|-&lt;br /&gt;
| Education and Research&lt;br /&gt;
| A community may be experienced and willing to provide guidance for students and researchers to analyze and learn how to solve certain types of problems or tasks.&lt;br /&gt;
| Negative impact:  The student or researcher will have to spend extra time learning and understanding a developed strategy of the program or source code is poorly written and no documentation is available for it.&lt;br /&gt;
|-&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
The main ethical issue with a license requiring the acceptance of the most recent version is that it forces the user to sign a contract which has not been written yet.  While the user could agree with the current version, a future version may change in such a fashion as to restrict the liberties of the user beyond what they would agree to.  This setup provides a large amount of leverage and power to the writers of the new versions of the license because they can force a huge tree of people into new agreements.  If a small, but widely used section of code was licensed under the GPL and the new version required additional profit restrictions, it would affect every project which used that code, as well as the projects which used those projects ect.  At the same time, if the license is changed in such a way that it benefits the users then that too can affect a large group.  The main ethical issue is the amount of power given to the writers of the license and how it is used.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Main Links '''&lt;br /&gt;
* [http://www.gnu.org gnu.org]&lt;br /&gt;
* [http://www.opensource.org opensource.org]&lt;br /&gt;
* [http://www.fsf.org/ FreeSoftwareFoundation.org]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1720</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1720"/>
		<updated>2007-07-16T09:52:57Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. In simple terms, a project licensed with the GPL can be freely distributed and charged for, but any and all distribution must provide the source code to the consumer as well.  Also, according to the GPL, any work which uses code licensed by the GPL must license itself with the GPL.  It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPL - Version 1.0, February 1989&lt;br /&gt;
** To guarantee the freedoms to share and change free software.&lt;br /&gt;
** To make sure the software is free for all its users.&lt;br /&gt;
* GPL - Version 2.0, June 1991&lt;br /&gt;
** Further restricted rights from Version 1.0&lt;br /&gt;
** Updated to cover distribution of the program or programs as a whole.&lt;br /&gt;
** Linux kernel released under this license version&lt;br /&gt;
* GPL - Version 3.0, January 2006&lt;br /&gt;
** Further restricted rights from Version 2.0&lt;br /&gt;
** Updated to the cohort the ability to make changes to software and to compel for changes to be distributed so everyone benefits from the intellectual energy used to make changes.&lt;br /&gt;
** Main purpose, the abolition of DRM as a social practice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
In general GLP software will impact certain groups, companies, or organizations differently and others in the same manner. &lt;br /&gt;
&lt;br /&gt;
The following sections will present different positive and negative impacts in support of GPL software:&lt;br /&gt;
* Personal Software Users&lt;br /&gt;
** Positive impact: The reduced monetary cost to acquire and use of software to achieve a personal task or action. No need to hack a commercial licensed product if a free version is available and easy to use. &lt;br /&gt;
** Negative impact: The learning curve and time to evaluate the software and its stability. In most cases GPL software lack proper documentation or specific key features. Although we can look at the code, we may be ignorant to the intentions of the programs and the community that created it.&lt;br /&gt;
* Developers - Open Source &lt;br /&gt;
** Positive impact: To encourage evolution of software without having to re-invent the wheel. To continue and encourage the open source movement. &lt;br /&gt;
** Negative impact: An unwelcome change of a supporting program feature will generate chatter and distractions and delays from the ultimate goals of the developed system. A breach of commercial copyright laws by the application or supporting programs.&lt;br /&gt;
* Developers – Commercial&lt;br /&gt;
** Positive impact: Developer can investigate and analyze already used and solved approaches to a problem and their core issues. Temptations caused by cost and times lines constraints may lead to illegal use of GPL code in commercial systems.&lt;br /&gt;
** Negative impact: Alternative free version of application is already available and free to users meaning that creating similar commercial version of the program will have to achieve higher appeal to justify its cost.&lt;br /&gt;
* Commercial Software Companies&lt;br /&gt;
** Positive impact:  Companies may be able to replace commercial software with open source counterparts to save money and increase profits. A good example of this is replacing their internal bug tracking system from a costly commercial one to bugzilla.&lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Non-profit organizations&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide a good solution or product to keep the operating cost down.&lt;br /&gt;
** Negative impact:  Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Government&lt;br /&gt;
** Positive impact: The Government may be able to replace commercial software with open source counterparts to save money. Encourage others to use GLP software. &lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Education and Research&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide guidance for students and researchers to analyze and learn how to solve certain types of problems or tasks.&lt;br /&gt;
** Negative impact:  The student or researcher will have to spend extra time learning and understanding a developed strategy of the program or source code is poorly written and no documentation is available for it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
The main ethical issue with a license requiring the acceptance of the most recent version is that it forces the user to sign a contract which has not been written yet.  While the user could agree with the current version, a future version may change in such a fashion as to restrict the liberties of the user beyond what they would agree to.  This setup provides a large amount of leverage and power to the writers of the new versions of the license because they can force a huge tree of people into new agreements.  If a small, but widely used section of code was licensed under the GPL and the new version required additional profit restrictions, it would affect every project which used that code, as well as the projects which used those projects ect.  At the same time, if the license is changed in such a way that it benefits the users then that too can affect a large group.  The main ethical issue is the amount of power given to the writers of the license and how it is used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Main Links '''&lt;br /&gt;
* [http://www.gnu.org gnu.org]&lt;br /&gt;
* [http://www.opensource.org opensource.org]&lt;br /&gt;
* [http://www.fsf.org/ FreeSoftwareFoundation.org]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1719</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1719"/>
		<updated>2007-07-16T09:29:37Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. In simple terms, a project licensed with the GPL can be freely distributed and charged for, but any and all distribution must provide the source code to the consumer as well.  Also, according to the GPL, any work which uses code licensed by the GPL must license itself with the GPL.  It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPL - Version 1.0, February 1989&lt;br /&gt;
** To guarantee the freedoms to share and change free software.&lt;br /&gt;
** To make sure the software is free for all its users.&lt;br /&gt;
* GPL - Version 2.0, June 1991&lt;br /&gt;
** Further restricted rights from Version 1.0&lt;br /&gt;
** Updated to cover distribution of the program or programs as a whole.&lt;br /&gt;
** Linux kernel released under this license version&lt;br /&gt;
* GPL - Version 3.0, January 2006&lt;br /&gt;
** Further restricted rights from Version 2.0&lt;br /&gt;
** Updated to the cohort the ability to make changes to software and to compel for changes to be distributed so everyone benefits from the intellectual energy used to make changes.&lt;br /&gt;
** Main purpose, the abolition of DRM as a social practice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
In general GLP software will impact certain groups, companies, or organizations differently and others in the same manner. The following sections will present different views of the impact&lt;br /&gt;
* Personal Software Users&lt;br /&gt;
** Positive impact: The reduced monetary cost to acquire and use of software to achieve a personal task or action. &lt;br /&gt;
** Negative impact: The learning curve and time to evaluate the software and its stability. In most cases GPL software lack proper documentation or specific key features.&lt;br /&gt;
* Developers - Open Source &lt;br /&gt;
** Positive impact: To encourage evolution of software without having to re-invent the wheel. To continue and encourage the open source movement. &lt;br /&gt;
** Negative impact: An unwelcome change of a supporting program feature will generate chatter and distractions and delays from the ultimate goals of the developed system. A breach of commercial copyright laws by the application or supporting programs.&lt;br /&gt;
* Developers – Commercial&lt;br /&gt;
** Positive impact: Developer can investigate and analyze already used and solved approaches to a problem and their core issues.&lt;br /&gt;
** Negative impact: Alternative free version of application is already available and free to users meaning that creating similar commercial version of the program will have to achieve higher appeal to justify its cost.&lt;br /&gt;
* Commercial Software Companies&lt;br /&gt;
** Positive impact:  Companies may be able to replace commercial software with open source counterparts to save money and increase profits. A good example of this is replacing their internal bug tracking system from a costly commercial one to bugzilla.&lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Non-profit organizations&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide a good solution or product to keep the operating cost down.&lt;br /&gt;
** Negative impact:  Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Government&lt;br /&gt;
** Positive impact:  The Government may be able to replace commercial software with open source counterparts to save money and increase profits. &lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Education and Research&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide guidance for students and researchers to analyze and learn how to solve certain types of problems or tasks.&lt;br /&gt;
** Negative impact:  The student or researcher will have to spend extra time learning and understanding a developed strategy of the program or source code is poorly written and no documentation is available for it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
The main ethical issue with a license requiring the acceptance of the most recent version is that it forces the user to sign a contract which has not been written yet.  While the user could agree with the current version, a future version may change in such a fashion as to restrict the liberties of the user beyond what they would agree to.  This setup provides a large amount of leverage and power to the writers of the new versions of the license because they can force a huge tree of people into new agreements.  If a small, but widely used section of code was licensed under the GPL and the new version required additional profit restrictions, it would affect every project which used that code, as well as the projects which used those projects ect.  At the same time, if the license is changed in such a way that it benefits the users then that too can affect a large group.  The main ethical issue is the amount of power given to the writers of the license and how it is used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''' Main Links '''&lt;br /&gt;
* [http://www.gnu.org gnu.org]&lt;br /&gt;
* [http://www.opensource.org opensource.org]&lt;br /&gt;
* [http://www.fsf.org/ FreeSoftwareFoundation.org]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1718</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1718"/>
		<updated>2007-07-16T09:24:47Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. In simple terms, a project licensed with the GPL can be freely distributed and charged for, but any and all distribution must provide the source code to the consumer as well.  Also, according to the GPL, any work which uses code licensed by the GPL must license itself with the GPL.  It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPL - Version 1.0, February 1989&lt;br /&gt;
** To guarantee the freedoms to share and change free software.&lt;br /&gt;
** To make sure the software is free for all its users.&lt;br /&gt;
* GPL - Version 2.0, June 1991&lt;br /&gt;
** Further restricted rights from Version 1.0&lt;br /&gt;
** Updated to cover distribution of the program or programs as a whole.&lt;br /&gt;
** Linux kernel released under this license version&lt;br /&gt;
* GPL - Version 3.0, January 2006&lt;br /&gt;
** Further restricted rights from Version 2.0&lt;br /&gt;
** Updated to the cohort the ability to make changes to software and to compel for changes to be distributed so everyone benefits from the intellectual energy used to make changes.&lt;br /&gt;
** Main purpose, the abolition of DRM as a social practice.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
In general GLP software will impact certain groups, companies, or organizations differently and others in the same manner. The following sections will present different views of the impact&lt;br /&gt;
* Personal Software Users&lt;br /&gt;
** Positive impact: The reduced monetary cost to acquire and use of software to achieve a personal task or action. &lt;br /&gt;
** Negative impact: The learning curve and time to evaluate the software and its stability. In most cases GPL software lack proper documentation or specific key features.&lt;br /&gt;
* Developers - Open Source &lt;br /&gt;
** Positive impact: To encourage evolution of software without having to re-invent the wheel. To continue and encourage the open source movement. &lt;br /&gt;
** Negative impact: An unwelcome change of a supporting program feature will generate chatter and distractions and delays from the ultimate goals of the developed system. A breach of commercial copyright laws by the application or supporting programs.&lt;br /&gt;
* Developers – Commercial&lt;br /&gt;
** Positive impact: Developer can investigate and analyze already used and solved approaches to a problem and their core issues.&lt;br /&gt;
** Negative impact: Alternative free version of application is already available and free to users meaning that creating similar commercial version of the program will have to achieve higher appeal to justify its cost.&lt;br /&gt;
* Commercial Software Companies&lt;br /&gt;
** Positive impact:  Companies may be able to replace commercial software with open source counterparts to save money and increase profits. A good example of this is replacing their internal bug tracking system from a costly commercial one to bugzilla.&lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Non-profit organizations&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide a good solution or product to keep the operating cost down.&lt;br /&gt;
** Negative impact:  Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Government&lt;br /&gt;
** Positive impact:  The Government may be able to replace commercial software with open source counterparts to save money and increase profits. &lt;br /&gt;
** Negative impact: Replacing a commercial program may require the company to incur extra maintenance cost and need to hire an experienced administrator.&lt;br /&gt;
* Education and Research&lt;br /&gt;
** Positive impact: A community may be experienced and willing to provide guidance for students and researchers to analyze and learn how to solve certain types of problems or tasks.&lt;br /&gt;
** Negative impact:  The student or researcher will have to spend extra time learning and understanding a developed strategy of the program or source code is poorly written and no documentation is available for it.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
The main ethical issue with a license requiring the acceptance of the most recent version is that it forces the user to sign a contract which has not been written yet.  While the user could agree with the current version, a future version may change in such a fashion as to restrict the liberties of the user beyond what they would agree to.  This setup provides a large amount of leverage and power to the writers of the new versions of the license because they can force a huge tree of people into new agreements.  If a small, but widely used section of code was licensed under the GPL and the new version required additional profit restrictions, it would affect every project which used that code, as well as the projects which used those projects ect.  At the same time, if the license is changed in such a way that it benefits the users then that too can affect a large group.  The main ethical issue is the amount of power given to the writers of the license and how it is used.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1662</id>
		<title>CSC 379:Week 2, Group 5</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Week_2,_Group_5&amp;diff=1662"/>
		<updated>2007-07-14T21:29:37Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=GNU General Public License=&lt;br /&gt;
&lt;br /&gt;
==Overview==&lt;br /&gt;
&lt;br /&gt;
The General Public License (GPL) was created in 1989 by Richard Stallman as originally a way of allowing many projects to share source code under a unifying license. It ensures that any software that was derived from open source remains available to the general public and freely distributable.&lt;br /&gt;
&lt;br /&gt;
* GPLV1&lt;br /&gt;
&lt;br /&gt;
* GPLV2&lt;br /&gt;
&lt;br /&gt;
* GPLV3&lt;br /&gt;
&lt;br /&gt;
==Discussion Questions==&lt;br /&gt;
&lt;br /&gt;
'''What is the impact of GPL use?'''&lt;br /&gt;
&lt;br /&gt;
* Personal Software Users&lt;br /&gt;
&lt;br /&gt;
* Developers - Open Source, Commercial&lt;br /&gt;
&lt;br /&gt;
* Software Companies&lt;br /&gt;
&lt;br /&gt;
* Industry and Business&lt;br /&gt;
&lt;br /&gt;
* Non-profit organizations&lt;br /&gt;
&lt;br /&gt;
* Government&lt;br /&gt;
&lt;br /&gt;
* Education and Research&lt;br /&gt;
&lt;br /&gt;
* Foreign Countries&lt;br /&gt;
&lt;br /&gt;
'''What are the ethical considerations for licenses like GPL that require their adoption if work licensed under it is incorporated into a parent work, with additional stipulations that include the acceptance of the most current version of the GPL license?'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''What ethical considerations are highlighted by the patent sharing/protection agreement between Microsoft and Novell?'''&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1415</id>
		<title>CSC 379:Weed 1, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1415"/>
		<updated>2007-07-06T12:34:43Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Anti-Spam Techniques ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Blocking Domains ===&lt;br /&gt;
Domain blocking is not always effective. Since spammers are often spoofing domains, this results in the [http://www.mywire.com/pubs/PCMagazine/2004/03/16/418338?extID=10051 unintended blocking of non-spammers.]&lt;br /&gt;
The Earthlink Spam Blocker&lt;br /&gt;
&lt;br /&gt;
Charging for Sent Emails&lt;br /&gt;
&lt;br /&gt;
===Opt-In===&lt;br /&gt;
Opt-In is a term used when someone is given the option of receiving bulk e-mail when they are registering to some sort of database system.  This technique implies a number of practices that will ensure correct ways of managing e-mail marketing campaigns.  &lt;br /&gt;
&lt;br /&gt;
[http://www.opt-in-email-marketing.org/ Opt-In E-mail Marketing] is a great resource for obtaining tips on e-mail marketing and reviewing other campaigns. &lt;br /&gt;
&lt;br /&gt;
=== Domain Authentication ===&lt;br /&gt;
Weaknesses in the SMTP protocol have allowed spammers to remain anonymous by allowing them to  &amp;quot;spoof&amp;quot; sender addresses. [http://www.buit.org/2007/05/25/get-rid-of-spam-with-smtp-authentication/ Domain authentication technologies] would correct this and allow spammers to be identified.&lt;br /&gt;
=== Bounties ===&lt;br /&gt;
Spam bounties, or rewards leading to the arrest of spammers, have been [http://www.cbsnews.com/stories/2004/09/17/tech/main644056.shtml considered by the US government]. In 2004, Congress requested a report by The Federal Trade Commission which concluded that rewards between $100,000 and $250,000 would be necessary to make the program work.&lt;br /&gt;
&lt;br /&gt;
=== The Goodmail approach: ===&lt;br /&gt;
&lt;br /&gt;
Described as a guaranteed delivery of email for a price. Email will be guaranteed not to be spam-blocked by the Goodmail providers to its customers.&lt;br /&gt;
&lt;br /&gt;
Although this will limit certain types of spam, like money cons from Nigeria, it does not prevent other types of corporate spam. This is more of a attempt to legalized marketing technique to spam.&lt;br /&gt;
There are also many individual and different interpretations of what spam is to an email user that we do not want the company deciding what is spam for all of its email clients.&lt;br /&gt;
&lt;br /&gt;
=== Bonds with escrow agencies: ===&lt;br /&gt;
&lt;br /&gt;
One of the archaic initiatives (as of 1994) to curve spam that was originated by on of our industry leaders &amp;quot;Bill Gates&amp;quot;. Although this technique creates some virtual money trail, it may produce corrupted escrow agents that can manage the results to hide certain individuals or companies from the blacklist. This technique could also limit the accessibility of email to non-profit organizations and/or poor individuals.&lt;br /&gt;
&lt;br /&gt;
It is hard to keep up and enforce correctly across different countries that may have laws to allow or disallow certain types of email. By providing this type of block the abusing individuals or institutions will change the medium on how email messages are delivered. From text to sound or movie files instead making it harder to detect and interpret by a program or filter.&lt;br /&gt;
&lt;br /&gt;
=== Links: ===&lt;br /&gt;
*[http://www.networkcomputing.com/showitem.jhtml?docid=1509f1 Anti-Spam]&lt;br /&gt;
*[http://blogs.zdnet.com/BTL/?p=2737 Goodmail Approach]&lt;br /&gt;
*[http://ansuz.sooke.bc.ca/lawpoli/spam/2004072502.php Bonds with escrow approach]&lt;br /&gt;
*[http://www.hospitalitynet.org/news/4020610.search?query=spam+bonds+with+escrow+agencies Bonds with escrow approach - Spam Filter]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1409</id>
		<title>CSC 379:Weed 1, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1409"/>
		<updated>2007-07-06T00:27:24Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Anti-Spam Techniques ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Blocking Domains ===&lt;br /&gt;
Domain blocking is not always effective. Since spammers are often spoofing domains, this results in the [http://www.mywire.com/pubs/PCMagazine/2004/03/16/418338?extID=10051 unintended blocking of non-spammers.]&lt;br /&gt;
The Earthlink Spam Blocker&lt;br /&gt;
&lt;br /&gt;
Charging for Sent Emails&lt;br /&gt;
&lt;br /&gt;
===Opt-In===&lt;br /&gt;
Opt-In is a term used when someone is given the option of receiving bulk e-mail when they are registering to some sort of database system.  This technique implies a number of practices that will ensure correct ways of managing e-mail marketing campaigns.  &lt;br /&gt;
&lt;br /&gt;
[http://www.opt-in-email-marketing.org/ Opt-In E-mail Marketing] is a great resource for obtaining tips on e-mail marketing and reviewing other campaigns. &lt;br /&gt;
&lt;br /&gt;
=== Domain Authentication ===&lt;br /&gt;
Weaknesses in the SMTP protocol have allowed spammers to remain anonymous by allowing them to  &amp;quot;spoof&amp;quot; sender addresses. [http://www.buit.org/2007/05/25/get-rid-of-spam-with-smtp-authentication/ Domain authentication technologies] would correct this and allow spammers to be identified.&lt;br /&gt;
=== Bounties ===&lt;br /&gt;
Spam bounties, or rewards leading to the arrest of spammers, have been [http://www.cbsnews.com/stories/2004/09/17/tech/main644056.shtml considered by the US government]. In 2004, Congress requested a report by The Federal Trade Commission which concluded that rewards between $100,000 and $250,000 would be necessary to make the program work.&lt;br /&gt;
&lt;br /&gt;
=== The Goodmail approach: ===&lt;br /&gt;
&lt;br /&gt;
This is more or a guaranteed delivery of email for a price. Email will be guaranteed not to be spam-blocked by the Goodmail provider and its customers.&lt;br /&gt;
&lt;br /&gt;
Although this will limmit certain types of spam, like money cons from nigeria, it does not prevent other types of coorporate spam. This is more of a attempt to legalized marketing technique to spam.&lt;br /&gt;
There are also many individual and different interpretations of what spam is to an email user that we do not want the company deciding what is spam for all of its email clients.&lt;br /&gt;
&lt;br /&gt;
[http://blogs.zdnet.com/BTL/?p=2737 Goodmail approach link01]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Bonds with escrow agencies: ===&lt;br /&gt;
&lt;br /&gt;
This was one of the archaic initiatives (as of 1994) to curve spam that was originated by on of our industry leaders &amp;quot;Bill Gates&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
Although this technique creates some virtual money trail, it may produce corrupted escrow agents that can manage the results to hide certain individuals or companies from the blacklist.&lt;br /&gt;
This technique could also limmit the accessability of email to non-profit organiations and/or poor individuals.&lt;br /&gt;
&lt;br /&gt;
Other problems with this approach include:&lt;br /&gt;
It is hard to keep up and enforce correctly accross different contries that may have laws to allow or disallow certain types of email&lt;br /&gt;
By providing this type of block the abusing individuals or institutions will change the meduim on how email messages are delivered. From text to sound or movie files instead making it harder to detect and interpret by a program or filter.&lt;br /&gt;
&lt;br /&gt;
[http://ansuz.sooke.bc.ca/lawpoli/spam/2004072502.php Bonds with escrow approach link01]&lt;br /&gt;
[http://www.hospitalitynet.org/news/4020610.search?query=spam+bonds+with+escrow+agencies Bonds with escrow approach link02 - Spam Filter Section]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Links&lt;br /&gt;
*[http://www.networkcomputing.com/showitem.jhtml?docid=1509f1 Anti-Spam]&lt;br /&gt;
&lt;br /&gt;
Group Members:&lt;br /&gt;
*[http://www4.ncsu.edu/~jjhernan Jorge J Hernandez]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
	<entry>
		<id>https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1379</id>
		<title>CSC 379:Weed 1, Group 2</title>
		<link rel="alternate" type="text/html" href="https://wiki.expertiza.ncsu.edu/index.php?title=CSC_379:Weed_1,_Group_2&amp;diff=1379"/>
		<updated>2007-07-05T22:47:06Z</updated>

		<summary type="html">&lt;p&gt;Jjhernan: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Group Members:&lt;br /&gt;
*[http://www4.ncsu.edu/~jjhernan Jorge J Hernandez]&lt;/div&gt;</summary>
		<author><name>Jjhernan</name></author>
	</entry>
</feed>