Free Essay

Software Bugs

In:

Submitted By jason9
Words 390
Pages 2
Issue:
Should software programmers and business owners be held liable due to the software bugs?

Economical Perspective:
Remember the times when cell phones are said to be for the business executives’ use only? But nowadays almost everyone owns at least one, even kids. Because of the tight competition in the market, prices of these cell phones, and other technology-based gadgets in that matter, go down every day. Even more, not only does it get smaller, stylish and more compact, its features also got more complex.
Cell phones now not only allow us to make a call or send a text message, it does a whole lot more than that. And we should admit it has made things easier, more convenient, and more efficient.
Keeping up with the competition, a lot of companies introduce new phone features every day. But along side, more often than not, we also experience some glitches that come with it –Bluetooth is not compatible with other phones, some programs force close at times, and some programs just wouldn’t work. But why do we still buy them?
Because we think, with all the helpful features it has, it already serves the value of the price that we paid for. In other words, we’d rather forgive a small glitch in exchange for a more affordable price. Some of the good companies make bug fixes available online anyway.

Social Perspective:
Softwares have helped us more than just to improve our lifestyles; they have contributed a lot in the knowledge base, and in the field of science. New discoveries have been made possible because of powerful softwares – We were able to see beyond the territories of our world, and identified the constellation with the help of satellites; we understood the behavior of weather, and detect changes in climate; underwater species, which we never imagined existed, have been named and discovered; and a whole lot more.
However, not all attempts were successful. Just like what was cited in the article provided, some projects that involved complex programming failed. Back in…
On a small scale, it would seem like a waste of money all because of a simple software glitch. But if you would aggregate all the contributions it made for our betterment, a few failures may be worth the cost. Learning after all always associates a handful of risk.

Similar Documents

Free Essay

Distributed System Failures

...hardware and application failures may also occur within a centralized system as well as distributed systems. In the event of an application failure, it is important to first be able to differentiate between operator error and software error in order to determine the point of failure. When a hardware error occurs, this can be due to a few simple causes. Hardware failures occur when a single component within the system fails. The most common types of hardware failures are of a link, a site, or the loss of a message. At one point hardware failures were a common occurrence, but with recent innovations in hardware design and manufacturing these failures tend to be few and far between. Instead, more failures that now occur tend to be network or drive related. Network failures refer to the failure of links within the distributed system network. Processors within a distributed system need to be able to communicate with each other via the network. When a link in this network connection fails, this causes functions to cease running. Application failure occur to the failure of applications that run within the system, and can occur when the application stops working or operates incorrectly. These failures may be caused by a variety of issues, including software bugs. Because there are numerous fail points in...

Words: 726 - Pages: 3

Free Essay

Alumni Mangement System

...ALUMNI MANGEMENT SYSTEM Introduction The main objective of the system is to create a forum to bring together and facilitate the exchange of information amongst its members and to give opportunities for its members to have a firm link between collage and its members. The alumni can provide the present college students with job opportunities like recruitment. This system will help alumni members to effectively communicate with their old friends, seniors, juniors and their batch mates and will also provide latest news and updates about the system activities. Alumni Online community will provide benefit to the organization by giving great leaders with commitment who upholds ideas and goals further in society of their organization. Alumni Management system provides internet services to remain in touch, feel nostalgic about their past memories. It will help to promote exchange of skills and experience amongst the members and to conduct seminars, workshop and guest lectures. It will also promote social and cultural activities useful to the members and society in general. These programs include reunions, luncheons and receptions, professional sports events, educational programs, and distinguish alumni awards. Overall Description Goals of proposed system Actions Measurable Outcomes Communicate strategically with graduates to create and enhance affinity with the campus · Increase e-newsletter open rate to 20% · Increase participation in social media · Obtain...

Words: 1184 - Pages: 5

Premium Essay

Distributed Systems

...failures which are Crash failures also known as operating system failures, Hardware Failures, Omission Failures and Byzantine Failures. Included in the discussion are failures which can also occur in a centralized computer system, and how to isolate and repair two types of failures. Crash failures are normally associated with a server fault in a typical distributed system. Inherently crash failures are interrupt operations of the server and can halt operation for a considerable time (Projects Helper, 2012).Operating system failures are the best examples for this scenario. Operating System or software failures come in many more varieties than hardware failures. Software bugs in distributed systems can be difficult to replicate and, consequently, repair and or debug. Corresponding fault tolerant systems are developed and employed with respect to these affects. An operating system or software failure can also occur in a centralized system such as a data base this is why it is highly recommended to back up a data base using stable mass storage media (Projects Helper, 2012). We have an extensive data base on our server at my work place. The storage back-up is run daily. I cannot imagine the man-hours it would take to re-input even a month’s worth of production data if it were lost due to a failure the system could not recover from. Hardware failures can occur in both distributed and centralized systems. Hardware failures used to be more common, but with all of the recent innovations...

Words: 280 - Pages: 2

Free Essay

Attacks

...Ransomware Discuss the threat When infected restricts you to access to a computer system. This will become more refined in its targets and methods. Experts predict that the variants of ransomware that hurt the security software that are installed within a computer may particularly target the endpoints which sign up with cloud-based storage solutions like Google Drive, Dropbox, OneDrive and many more. On detecting the endpoint, ransomware will exploit the stored personal credentials of the logged-in user and will even infect the cloud storage that is backed up. McAfee has warned that ransomware attackers will try out as many ways possible to shell out ransom payments from their victims. Degree of damage The most advanced and most damaging ransomware in the wild at the moment, specifically targeting U.S. businesses and individuals. It's a $70 million per year criminal enterprise. Its magnitude is now confirmed by law enforcement. Some quick math shows $18,145 in costs per victim, caused by network mitigation, network countermeasures, loss of productivity, legal fees, IT services, and/or the purchase of credit monitoring services for employees or customers. As you can see, the total costs of a ransomware infection goes well above just the ransom fee itself, which is usually around $500 but can go up to $10,000. What it attacked Ransomware is a type of malware that infects a computer and restricts a user’s access to the infected computer. This type of malware...

Words: 2057 - Pages: 9

Premium Essay

Bed Bug Killer Research Paper

...question about the amount of frustration and anxiety a person can experience if they have bed bugs in their homes. These nasty guys are quite difficult to find, as they can hide in a variety of different locations. A secret of Bed Bug Killer known to only a few individuals is proper cleaning. You could go and grab a pesticide or spray of some sort, but cleaning can help in the initial stages. First and foremost, you need to create a clean and organized environment. Cleaning is the most essential step you need to fulfill. When doing this, it is a great idea to rip the bedroom apart. Take the mattress off of your bed-frame and move all furniture away from the walls. Then, look for any openings you see and seal them permanently shut....

Words: 445 - Pages: 2

Free Essay

Game Bug

...Jonathan Sandoval SG420 Game Bug Report March 31, 2013 If one wants to start a career in the video gaming industry as a tester, one must be able to connect the dots between seemingly unrelated events. Writing a video game concern might seem like a simple task but it comes with a great deal of responsibility. This is a communication from which other people will base a plan of action on. Those actions often include committing costly resources to resolving the issue. When writing a Game Bug Report, it is important to provide as much information as one can in order for the bug to be “fixed”. The faster the bug is found, the faster the bug will be fixed, thus helping everyone in the long run. A bug report can be broken down in four sections. Title: * Summarizes the important factors of the issue. * Simple overview of what, where, when, why and how it is caused, highlighting the most important considerations in the game. * Indicates how severe it is. * Is used by others to plan a course of action, so it needs to be understood at a glance. Description: * Succinct description of who, what, where, when, why and how it is caused without leaving out any details. * Here you should describe accurately EVERYTHING about the concern. * Describe it in such a way that the reader can reproduce it SOLELY from the description and understands completely what is happening. * You may use industry standard jargon to help accurately describe the issue...

Words: 938 - Pages: 4

Premium Essay

Information Technology

...• What software have you used for bug tracking and version control? • What do you use for unit testing? GUI testing? • Describe an interesting class you have designed. • Have you been doing code reviews? What was the format? • When and how do you optimize code? • Describe your favourite build environment. • What is the difference between GET and POST in web forms? How do you decide which to use? • What are some of the HTTP commands? • What is Service Oriented Architecture? Advantages and Disadvantages? • What JavaScript libraries have you used? • What is the advantage of using CSS? What are some of the irritating limitations of CSS? • What are some influential software books you’ve read lately? • What are your favourite technical web sites and blogs? • Are you doing any interesting personal web projects? • What do you like about software? • Why did you apply for this position? • Would you tell us what attracts you to a career with us? How do you see your studies, skills, experience and personal qualities contributing to the work of the organization? • Describe a time when you had to deal with conflicting demands. How did you deal with this situation and what was the outcome? • Can you describe a time where you have been required to perform as part of a team? What was the situation? What part did you play in the team and what was the outcome of the exercise? • How do you establish a working relationship with new people? • What particular skills and qualities...

Words: 480 - Pages: 2

Premium Essay

Picture the Supply Chain

...Axia College Material Appendix B Picture the Supply Chain Complete the chart below by outlining the digital content supply chain at Warner Bros. Entertainment. |Upstream Component |Internal Component |Downstream Component | |(sourcing/procurement) |(packing/assembly |(distribution) | | |manufacturing) | | | | | | |This supply chain designates the source and|This type of supply chain, packaging |This supply chain involves distribution | |procurement are made from external |manufacturing and assembly all take place |mainly through external means. | |suppliers |in the same environment. | | | | |Warner moved to digital distribution in the| |Hewlett-Packard is the main suppliers used |Warner shifted to a digital end to end |form of broadband, high-definition | |by Warner Bros. |business in response to the trend that |television (HDTV) and DVDs...

Words: 365 - Pages: 2

Premium Essay

Bug Bounties Research Paper

...Bug Bounty Information Paper A ‘Bug Bounty’ is a program where private or public entities provide recognition, awards, and compensation in exchange for the responsible disclosure of vulnerabilities, or bugs, in their public or private-facing infrastructures. While conventional penetration testing has a predetermined actor testing a predetermined scope, Bug Bounties generally allow for any actor to attempt to exploit the service without fear of prosecution. If this actor stays within the scope of the Bounty (e.g. not compromising personal data, breaking key infrastructure, etc.), and reports the bug responsibly to the company, without publicly releasing it first, they may receive compensation or awards. Bug Bounties have become increasingly...

Words: 398 - Pages: 2

Free Essay

The Pentium Fdiv Bug

...Abstract In this research paper I will be discussing the bug that was discovered and reported in 1994. The Intel P5 chip was found to have a floating point unit bug that made digital divide operation in algorithms flaw after the 4th decimal point. I will also be touching on the contributions of Professor Thomas R. Nicely and the time line on which he brought attention to the bug from the Intel P5. The Pentium FDIV bug The Pentium FDIV bug was first discovered by a professor named Thomas R. Nicely from Lynchburg College in Virginia. He discovered there were a few missing entries in the lookup table by the digital divide operation algorithm. Sadly Intel knew about the bug when they were testing the chip in June of 1994. Intel’s managers decided the error would not affect as many people as it would to issue a recall, and that they should not inform anyone outside the company. Later thet same month Dr. Nicely, a professor of mathematics noticed small differenced in two sets of numbers. Dr. Nicely spent months eliminating possible causes such ad PCI bus errors and compiler artifacts. October 19th after testing on several 486 and Pentium-based computers Dr. Nicely was certain that the error was caused by the Intel P5 processor. On the 24th of October he contacted Intel technical support and the support representative confirmed the error and said that it was not reported before. Then on October 30th after receiving no more information from Intel he sent an email message...

Words: 955 - Pages: 4

Free Essay

Bugs Bunny

...Bugs Bunny has and continues to be a standing favorite all, his popularity spans generations crossing over form one millennia to the next, he is iconically global and can be viewed in many languages in thousands of homes. True to form the creation of this character has spawned within our culture a love for such a character that he has become not only a welcomed spokes person but an undying legend whose roots can possibly be traced back hundreds of years he is everybody’s hero we laugh and cheer when he is victorious and are shocked and somewhat upset when he “loses.” Warner Bros., released his first cartoon over sixty years ago. Since “There have been over 150 Bugs Bunny cartoons, and all but about twelve are still shown rather frequently on television today. Bugs has had a more diverse and accomplished career than many Hollywood actors ever have, and some of the zaniest and funniest performances ever in film history. This did not happen overnight, by any means. Bugs Bunny's cartoons were directed over the years by such creative geniuses as Tex Avery, Chuck Jones, Friz Freleng, Bob Clampett, Robert McKimson, Frank Tashlin, and others, all of whom left their mark in film history with these animated films, and Bugs was only one of the dozens of classic creations these men worked with and created. Also not to be forgotten are the creators of the Warner cartoon soundtrack, Mel Blanc (the voice of Bugs) and musicians Carl Stalling, Milt Franklyn and William Lava” (Hunter).            ...

Words: 4019 - Pages: 17

Free Essay

A Different View of Al Capone

...This was just the beginning of his downfall and it all began on February 14, 1929. First of all, Chicago had split into two rival gangs led by Al Capone and George “Bugs” Moran, by the late 1920’s. Both of these leaders vied for power, prestige, and money (Rosenberg 1). Much of the problems arose after Capone’s former enemy Dion O’ Banion was killed and it started an all-out-war in the city (The St. 1). Moran was soon the new leader. Capone’s hopes of obtaining more territory were diminished and this frustrated him. Al Capone soon began to brainstorm into developing an attempt towards George “Bugs” Moran (Rosenberg 1). Capone’s reputation as a bootlegger would soon change into horror. In order for everything to turn out as planned, Al Capone obtained help from Jack “Machine Gun” McGurn. McGurn was placed in charge to organize an assassination attempt towards “Bugs” Moran. McGurn was said to have survived many attempts so he was perfect for Madueño 2 the job. The plan was to select gunmen outside of the Chicago area. This was to ensure that if there were any survivors, they wouldn’t be able to recognize the killers as part of Capone’s gang. McGurn also acquired a stolen police car and various police uniforms. After all of this was set, Capone sent a Detroit gangster to offer Moran a load of hijacked booze. Bugs agreed to gather the delivery at his gang’s headquarters, a garage at 2122 North Clark Street (Sifakis 289). Capone had a very special “valentine” that he wanted delivered...

Words: 603 - Pages: 3

Free Essay

Pneumonoultramicroscopicsilicovolcanoconiosis

...Chapter I INTRODUCTION Pneumonoultramicroscopicsilicovolcanoconiosis iis an English word that refers to a lung disease that is otherwise known as silicosis. It is the longest word in the English language published in a dictionary, the Oxford English Dictionary. According to the Oxford English Dictionary, it is "an artificial long word said to mean a lung disease caused by inhaling very fine ash and sand dust."[1] Silicosis is a form of occupational lung disease caused by inhalation of crystalline silica dust, and is marked by inflammation and scarring in the form of nodular lesions in the upper lobes of the lungs. It is a type of pneumoconiosis Statement of the problem 1. What is the couse of Pneumoconiosis? 2. How can it be prevented? 3. What are the symptoms? 4. How can affect in our body? 5. What are the treatment? Statement of the Hypothesis HO1: .A pneumoconiosis cause by inhalation of every fine silicate or quartz dust which is found in volcanic ash. HO2: Pneumonoultramicroscopicsilicovolcanoconiosis is fairly easy to prevent. Most countries do not have any volcanoes or any other places where silica dust exposure is likely. In case you live in one of the countries that does, here are few ways how to prevent this disease: Do not go in or near an active or non-dormant volcano. Do not expose yourself to silica dust for long periods of time. If or long periods of time...

Words: 3268 - Pages: 14

Premium Essay

Al Capone

...Al Capone Alphonse Capone is the son of Neapolitan immigrants Gabriel and Teresa Capone. They had nine children. He was their forth, born January 17, 1899, in Brooklyn, New York. This is where he attended Public School 7 from age 5 to 14 until an incident with his 6th grade teacher, he gave her a beating and was then beaten and expelled by his principal, never to return. Beatings were a typical form of punishment for public school in this age and young Al was known to challenge authority. Expelled from school and transplanted to a different neighborhood, Capone met notorious criminals like; Johnny Torrio and Lucky Luciano when he joined two street gangs, the Brooklyn Rippers and the Forty Thieves Juniors. Within a few years he was regularly involved in organized crime. Capone worked at a night club called the Harvard Inn for the crime boss Frankie Yale. One night at the Harvard Inn, Capone insulted a young woman which led to fight. The brother of the woman gave Al a beating and a new nickname “Scarface”. This incident also led to Capone’s first arrest “disorderly conduct”. Al met Mary “Mae” Coughlin, a young Irish woman at a dance in 1918. It must have been a tumultuous, whirlwind of a romance because she gave birth to their son Albert “Sonny” Capone on December 4th, 1918 and then they married on December 30th, 1918. Capone was the prime suspect of two murders and the brutal beating of a rival gang member that led to an extended hospital stay. Frankie Yale knew that the...

Words: 2244 - Pages: 9

Free Essay

Ispg

...might take to collect data from a suspect system. I will also provide a simple tool that can be used to collect all type of data from different location, making the investigator job much easier and help maintain the integrity of the evidence collected to be presented in court. . Forensic Cases There are many location that and investigator search to obtain data using computer forensic tools in a case on financial fraud and child pornography cases. In the case of a financial fraud emails can provide investigators with information not only the text but also the headers. The email headers can provide investigators with the information of who created the email, what software they used and the IP addressed that sent it. The email header also provide a date and time was sent. Credit card data shows the activity of charges. It show the location a person used a card as well as the time and date and what the purchase. From a personal experience I bank with USAA. The bank knows when I leave the country because of the direct deposit have a code of were a soldier is currently located and plus I always inform them when I leave the country. One day the bank calls me and asks me have I or have I been to Australia in the past week....

Words: 1093 - Pages: 5