History and Ethics

advertisement
History of “Computers”
• Manual calculators
– Humans implemented the algorithm
• Abacus (at least 2000 years old)
• Slide rule (developed about 1621)
• Mechanical (manually powered) calculators
– Algorithm is part of the device’s mechanical
construction
– 1623 Schikard’s Calculator
– 1642 Pascal”s Pascaline
– 1673 Leibniz Calculator
– 1820 Colmar’s Arithmometer – first mass produced
Chapter9 History and Ethics
1
Steam powered calculator
• Charles Babbage (1822-1830s)
– He had neither the money nor the technology
for his ideas, but his device was to have a
memory, programmable processor, programs
and data input through punched cards
• Countess of Lovelace (Ada Byron), a
trained mathematician, wrote programs
– Also financed Babbage (to her financial ruin)
Chapter9 History and Ethics
2
Punched cards
• Jacquard used punched cards to control the
pattern of weaving looms – 1700s
• Hollerith used punched cards for the 1890
census
– Hollerith’s Tabulating Machine Company
became International Business Machines in
1924
• NCR, Olivetti, Burroughs, Remington all
developed business machines
Chapter9 History and Ethics
3
Modern Computers
• Atanasoff-Berry Computer 1937-1942
–
–
–
–
–
Vacuum tubes for processing circuitry
Binary number system
All electronic (no mechanical components)
Digital
Never patented
• Atanasoff called to Washington for war effort
– Constructed a working prototype
Chapter9 History and Ethics
4
ENIAC and UNIVAC
• Mauchley visited Atanasoff in Iowa
• Eckert-Mauchley developed computers
based on same principles
– UNIVAC was first commercially successful
digital computer
– Acquired by Remington Rand, which became
Sperry Rand
• Sperry Rand tried to patent the architecture
• Atanasoff/Berry sued and won
– Berry died mysteriously
Chapter9 History and Ethics
5
COLOSSUS
• British computer used during WWII
• 1943-1945
– Vacuum tubes, binary arithmetic, electronic
– Cracked German Enigma code
– Alan Turing had a major part
• Turing machine
– The COLOSSUS had no influence on
development of computers - kept secret
Chapter9 History and Ethics
6
Early computers
• “First generation” digital computers
• Occupied an entire room
• Vacuum tubes controlled the flow of data
–
–
–
–
Generated a lot of heat
Wore out quickly; also leaked
As large as a large light bulb
By the late 1940's, large computers contained thousands of vacuum
tubes and took up perhaps100 square meters of space.
• Analog computers were also developed
Chapter9 History and Ethics
7
Software for 1st generation computers
• Programming was in machine code
– 0s and 1s
• An instruction such as 001 11001 might mean
get (001) the value from address 11001 and place in some
implicit location – a register or memory location
• Then assembly language was developed
– A program translated mnemonics such as “get” to 001
• These programs were difficult to write and debug
• They were not portable since machine language is specific to a
machine’s architecture
• Programs were custom developed for specific application
Chapter9 History and Ethics
8
Second Generation Computers
• Transistors developed at Bell Labs
beginning in 1947
– Used in portable radios, then TVs
• Radio was a big part of US entertainment in 1940s
– Regulated current or voltage flow to switch
data between registers and memory
– Cheaper, smaller, more reliable, used less
power than vacuum tubes
Chapter9 History and Ethics
9
Software for 2nd generation computers
• In early systems, programmers wrote their
own input/output routines
– Most of the applications were computational
and i/o was limited
• i/o is the most repetitive, tedious part of
programming
• Operation Systems first developed as i/o
monitors – performing i/o for all programs
Chapter9 History and Ethics
10
Software for 2nd generation computers
• Development of “high-level” languages
– Fortran (computation), Lisp (artificial
intelligence), and Cobol (business applications)
• All three (updated) are still in use today, with Cobol
perhaps the most common
• Compilers or interpreters translate
programmer code to machine language
– Programs are portable if there exists a compiler
for their language for various architectures
Chapter9 History and Ethics
11
rd
3
generation computers
• Development of integrated circuits
– Thousands of transistors, resistors, diodes,
capacitors manufactured and connected
together, packed onto a miniaturized chip.
– Cheaper, faster [reduced latency of signals
sent], smaller, less power needed
– IBM built the 360 Mainframe computers
– Digital Equipment Corp. built PDP minis
Chapter9 History and Ethics
12
rd
3
generation software
• Software engineering
– Development of tools and designs to make
programming an engineering discipline
– Structured programming
– Modular programming
Chapter9 History and Ethics
13
th
4
generation computers
• Development of personal computers and
networks
– 1971 first general-purpose microprocessor
– 1975 – first commercial microprocessor (kit)
» Altair developed by Ed Roberts for MITS
– 1969 – Arpanet
– 1971 Intel 4004 microprocessor was
considerably less than a cubic inch in size but
had the power of ENIAC
Chapter9 History and Ethics
14
th
4
generation software
• Development of application programs for
personal computers
• Spreadsheets, word processing
Chapter9 History and Ethics
15
Apple computer
• Commodore, Atari, RadioShack, Timex
sold preassembled kits
– Applications were limited
• Kits are still used by hobbyists
• Steve Jobs and Steve Wozniak released
Apple I – 1976
– A kit contained 4kB RAM and cost $666
– About half the cost of the Volkswagen Beetle
Chapter9 History and Ethics
16
Growth of Personal Computers
• IBM marketed the Personal Computer 1981
• User communicated with OS via command
line
• Applications made personal computers
popular for small businesses
– VisiCalc, then Lotus spreadsheets
– Electric Pencil, Wordstar Wordperfect for
word processing
Chapter9 History and Ethics
17
PCs
• IBM did not retain rights to the OS for the
PC (PC-DOS)
– Control kept by Bill Gates, Microsoft
• Other companies manufactured clones of
the PC, on which MS-DOS ran
• IBM thought that the major value of PCs
was the hardware
Chapter9 History and Ethics
18
GUI
• Xerox Alto computers, GUI developed by
Xerox but not patented.
• Apple Lisa “borrowed” the GUI for their
Apple Lisa (1983), then used for the
cheaper Apple Macintosh (1984).
• Windows OS developed by Microsoft
– Ran on all PC-compatible machines
Chapter9 History and Ethics
19
Killer App
• The general public was still not buying
personal computers – expensive, still not
that easy to use
• The “killer app” was the Internet
– Spread to commercial use by the late 1980s
• GUI browser
• ISPs provided inexpensive connections
• Development of e-commerce sites
Chapter9 History and Ethics
20
Computers today
• Positive effects include:
–
–
–
–
Communication
Education
E-Commerce
Social Networking
• Negative effects include
• Video Games/ gambling
• Privacy and security issues
Chapter9 History and Ethics
21
Professional Ethics
• What are your standards for conduct when
you are on-the-job or during schoolwork?
• How do your ethics relate to the law?
– Laws are (or should be) legislated codes of
conduct based on what is considered the
community’s ethics
• Some behavior is legal but not ethical
• Some laws, or their implementations, are
not ethical
Chapter9 History and Ethics
22
Some computer-related laws
• See text p. 524
– 1976 – extended copyright law
– Fair use doctrine for education or personal use
• Limited usage of copyrighted material
– 1984 Companies are not responsible for user
misuse of purchased equipment
– 1986 Computer Fraud and Abuse Act
• It is a criminal offense to knowingly access a
computer without authorization, or cause damage
resulting from infringement
Chapter9 History and Ethics
23
More relevant U.S. Laws
• 1998 Digital Millennium Copyright Act
– Illegal to circumvent, or to assist in
circumventing mechanisms to prevent copying
copyrighted material
• 2003 CAN-SPAM Act
– Requires senders of commercial e-mail to
attach a valid subject line as well as the
sender’s legitimate physical address.
Chapter9 History and Ethics
24
Some issues to be discussed
• Privacy – encryption, secure authorized access
• Use of copyrighted and licensed material
– watermarks
• Use of work computers for personal
business – distribute company policies
• Hacking – laws and prosecution
• Whistle blowing – policy for anonymous
whistlebrowing
Chapter9 History and Ethics
25
Forensics
• Computer forensics is the “scientific
examination and analysis of data located on
computer storage media, conducted to offer
evidence of computer crimes in court.
1) Crimes that use computers (violating
copyrights, child pornography, identity
theft)
2) Attacking computers (DDoS, destructive
viruses, vandalizing web sites)
Forensics Techniques
• Copy disk image to a STERILE write-once
medium
• Original disk is secured and saved
• Data recovery software can retrieve deleted
information
• Temporary Internet files show the visited sites
– You can delete these
– Browser/tools or temporary internet files
• Virtual memory caches hold parts of files
Catching cybercriminals
• Honeypots
– Attract cybercriminals to web sites,
“vulnerable” computer systems
• Place government agents in web groups
• Gather information on organized crime
– Follow the money trail
– Collect and analyze data
– Create site (e.g., the Internet Crime Claim
Center) for victims
Work Safety/ radiation exposure
• Radiation risks
– Cell phone towers/ cell phones
• Check radiation level (SAR-specific absorption rate)
• Use hands-free headset
– Wireless networks/ electrical appliances
– Computer Screens/ TV screens
• Radiation is primarily low frequencies and degrades
quickly (say within 20 inches – or an arm’s length)
Chapter9 History and Ethics
29
Work Safety/ ergonomics
• Ergonomics is the study of how to create
safe (working) environments
– Repetitive stress can cause stiffness, pain, and
injuries to tendons, muscles, and nerves
– Carpal tunnel syndrome – compression of the
nerves controlling your thumb and index finger
mainly. Affects your wrist as well.
Chapter9 History and Ethics
30
Ergonomics
• Monitor should be arm’s length from your
body – 18” to 22”
• Keyboard slightly tilted away from your
body
• Keyboard above your lap
• Mouse at some highly as your keyboard
• Walk around periodically
Chapter9 History and Ethics
31
Ergonomics for mobile phones
• Smart phones should NOT be used for extended computer
activity
• “Use hands free devices to eliminate awkward, static
postures ‐ especially during long phone calls.
• Limit duration and frequency of calls, texts, and emails.
• Maintain neutral wrist posture and alternate hands when
holding devices.
• Reduce keystrokes with text shortcuts (search “text
shortcuts” on your web browser or app store), or where
feasible, use speech‐recognition applications.”
•
http://www.stanford.edu/dept/EHS/prod/general/ergo/documents/laptop_guide.pdf
Chapter9 History and Ethics
32
Provenance
• Provenance is the “origin and history” of an
object [from text] {pedigree?}
• Web sources
– URLs, peer reviewed, ads, authors can be useful
– Original or reposted material (are the same phrases
used in many other postings)
– Dates
– Doctored photos
– Contact information provided
– Login required?
Chapter9 History and Ethics
33
Download