A Session With 3 Giants

On the 21st October 2011, the group went to a talk given by three speakers from InternetNow, TIME Engineering Berhad and HP.

A representative from InternetNow, Mr. Ilyas Sapiyan shared about useful tips on how to excel in software development career. He also managed to inspire us to take life challenges as lesson to be learnt.

The second speaker is from TIME Engineering Quantum Technology Sdn. Bhd., Mr. Vernon Wong who discussed in detail on what careers exist in Information Technology (IT) field. He also shared on characteristics of the IT industry and how to adapt quickly to it.

The third speaker, Mr. Devanandan Palmer Batumalai who is from Hewlett-Packard (HP) shared a brief history of the company and how the company inspired so many lives. He briefed on the working environment in HP which is indirectly exposing us to work environment of IT professionals. He also shared the HP Graduate Development Program which will prepare graduates before entering their career in HP.

Overall, the talk given by 1Malaysia line of speakers (Malay-Chinese-Indian) inspired us that there are broad possibilities in the IT industries and adapting to it will be a challenge but being a part of the rapidly changing industry is a long-time learning experience that will be lead to successful career.

Photo with the third speaker, Mr. Devanandan Palmer Batumalai

Part 2

Question 1

"Should you recommend release of the product next week?"


Answer:
Yes, we would recommend release of the product next week but first of all, we will need to talk with the company's management about hiring part time qualified software testers to work with our team of software testers and rescheduling the working hours. Since time is important here, hiring the part time testers and having a 24 hours rotational shift will shorten the time of fixing and testing of the known bugs. The software tester’s staff must have proven skills and sound knowledge of the job and manage to work well with teams and strictly meeting deadlines. Staff will be rewarded if they can successfully secure this project. This will be a good motivation for the staff to they will do their best to work well with their team in order to accomplish the goals.



Question 2

"Who will benefit if the company follows your recommendation?"

Answer:
All employees will get the benefits from our recommendation. This is one of the subject relativism that applied in my recommendation where if the employee doing works successfully then the employees have a right to get the bonus or rewards. Besides that, our company will be known and popular to all customers if the delivery product can finish and release it before our competitor release that product first. This is also part of ethical under Act Utilitarianism where it stated that we do any action to make other people happy can be considered as an ethical action.


Question 3

"Who will be harmed by the decision?"

Answer:
The biggest issue that needs to be looked at here is the software’s purpose. This software is created for medical aid, which is a serious matter no matter how we looked at it. In any possibilities, we should look at this criteria in 2 different perspective, either the project succeded with least bugs or the project fails with major bug(s). No matter how we look at it, these 2 criteria will determine whether the company and the client will be harmed or not. In case of the project fails, and the client decided to implement it, it my cause danger to the patient tested using the software provided. Records might dissapear or give wrong information and since we do not know what the bug is, this will drag in the company’s liability too. With faulty software comes disbelief in future record. But, the testers had only found minor bugs so far. This helps in increasing the confidence level in releasing the software. In any case, both the company and the client can be harmed with this decision.





Question 4


"Do you have an obligation to any group of people that may be affected by your decision?"


Answer:
There will be a business and moral obligation to the client and the client’s patients as the bugs exist may affect overall performance of the client to manage their patient efficiently. In some case where there might be an emergency, such minor bug as unable to locate patient correctly may cause client to risk their patient’s life. This will cause both client and developer to lose trust between each other and lost credibility to the general public that may cause both client and developer industry to collapse.

However, with more work forces on the software testing and debugging department, minor bugs which affect crucial functionalities of the system can be found and fixed just enough time before the launch of the software and follow up updates can be released post-launch. This will ensure the software to be continuously tested and supported to avoid the minor bugs from producing bigger issue in the future.



Question 5

"Identify and match the ACM code of ethics that relate to this scenario."

Answer:
5.0 Be honest and trustworthy.
According to ACM which stands for Association for Computing Machinery (2011), a computing professional within an organization should not hide any information regarding the presence of bugs or weaknesses within a company’s product. In the scenario’s case after completing their testing, the test group leader does his job in acknowledging and warning the higher up that their product still contains minor annoyances despite only a few days away from launch. The testing team also proposes an honest estimation that if they are given one more month, it is sufficient for them to correct all those bugs and prevent the birth of a more lethal fault. That is, if it is agreed by the higher up positions in the company to delay the launch date for another one month.

5.1 Avoid harm to others.
As outlined by ACM (2011), the code prohibits the usage of computing technology that results in negative consequences to any party involved such as users and the environment around them. Negative consequences may range from loss of data to physical damage and even injury and loss of lives.

The scenario describes a ‘revolutionary software’ in monitoring hospitalized patients which is a few days away from being released. Once released, it would be used in hospitals around the world. As pointed out, the test group leader has warned the company that the anticipated software contains several bugs. They are nothing but minor ones. Although bugs do not mimic the seriousness of an actual fault, they could still reduce the software’s effectiveness and produce awkward behaviours. Bugs are also subtle, meaning that not all people would notice them until the damage is clear. According to Gleick (1996), an unmanned Ariane 5 rocket carrying a satellite payload, swerved off course and exploded on 4th June 1996 due to a minor bug on the software that controlled its flight pattern. Before the incident, the same software had been responsible for many successful Ariane 4 launches. Engineers had noticed the bug long before the incident but did nothing quickly to investigate and fix it, thinking it would pose no problem for future launches until the Ariane 5 incident.

Likewise in this scenario, bugs in the software could eventually lead to more serious problems, if they are not coped quickly. It is because according to Duarte (2008), the longer the bugs stay, the harder and more expensive it is to fix. In time, they would cause damage worth millions of dollar. Since the software is unique that it involves hospitalized patients, there is also chance there might be injuries or even loss of lives due to misinterpretation from the software. For instance, a nurse might believe the reading from the computer to be valid, that a patient requires medical attention. The truth is, the reading is slightly inaccurate due to the bug. So the patient might be treated with medicine which actually proves fatal toward him.

Since the matter involves the lives of human patients, it is especially important to think twice. If the testers find out the company is still going to release it next week despite the bugs notice, according to ACM (2011), they could ‘blow the whistle’ to express the danger how the bugs could affect the safety of patients, if they all think the bugs could lead into certain disaster. They could also reason with the higher up why the product should not be released for another one month. If by any chance the product is sold in the market with the bugs, the company would be held responsible if it causes harm to any party.

A method known as prevention is better than fixing the problem when sometimes it appears to be already too late. Again according to ACM (2011), the company should conform toward universally agreed standards for system design and testing. This is to minimize the likelihood of any fault occurrence early in development life-cycle. It is required for individuals involved in the development to consider the likely impact on the end users caused by their decisions during design and implementation. Social consequences coming from product should also be considered to prevent or at reduce harm level onto the users and general public.

5.2 Strive to achieve the highest quality, effectiveness and dignity in both the process and products of professional work.
The description for the above code as outlined by ACM is “Excellence is perhaps the most important obligation of a professional. The computing professional must strive to achieve quality and to be cognizant of the serious negative consequences that may result from poor quality in a system.”
(ACM, 2011)

Since the company in question is a start-up company, it is important that it succeeds with the first product to find itself established in the market and continue their operations in the future. Therefore employees should always perform their duties up to professional standards in all aspects to achieve a good first product. Employees working in a professional manner would send positive impressions toward other companies and customers would frequently do business with them as well. Especially for a start-up company, they should well realize the failure to maintain the optimum level of professionalism and concentration when performing their duties would result in weak and faulty areas for the product. This would lead to criticisms by customers and drop in sales. Start-up companies would close down easily in this manner. It should learn from the experiences of more established companies.




References:

1. Association for Computing Machinery, 2011, Code of Ethics [online] Available at: <http://www.acm.org/about/code-of-ethics> [Accessed 9th November 2011].
2. Duarte, Gustavo, 2008, Richard Feynman, the Challenger Disaster, and Software Engineering [online] Available at: <http://duartes.org/gustavo/blog/post/richard-feynman-challenger-disaster-software-engineering> [Accessed 11th November 2011].
3. Gleick, James, 1996, A Bug and a Crash [online] Available at: <http://www.around.com/ariane.html> [Accessed 10th November 2011].

Week 8 Group Exercise

Question 1
"Many cell phones now come equipped with cameras. Managers of health clubs are concerned that people in locker rooms may be secretly photographed by other members carrying small cell phones. What do you think about this? Discuss your answer based on one ethical principle of your choice."


Answer:
- As illustrated by this question, the act is clearly wrong and unethical because the person who conducted this act takes the photos of other members secretly, without their permission or consent. This is because it is humiliating as well as degrading for the affected parties where his or her photos have been secretly captured, and distributed to the public, their reputation, honor, and credibility and most importantly their life will be greatly affected.
In order to support this opinion, Kantianism will be used to further defined and supported why the act is considered as immoral and unethical. This is based on the ethical principle of Kantianism, specifically related to the second formulation which generally states that if the action done does not exploit other people without their consent then it is acceptable. If it does, the action is said to be unacceptable and unethical.
The issue here is that health clubs’ managers are afraid that people in locker rooms may become victims by the people with such devices. They may be photographed or even video recorded for the purpose of blackmailing or to an extent to gain pornography material, if the victims involve women in the locker room. The point is that, managers could not simply ban their members from bringing cell phones upon entry into their health facilities. This is because people these days are relying heavily on cell phones which they see as a very important communication device. They need to have them everywhere they go as means of communication. Banning cell phones might also have another devastating consequence to the health clubs that impose so. First off and most obvious is, they might be criticized by their customers. Secondly and eventually, customers would not go to those clubs, crippling the clubs’ economy which would lead to closedowns. Hence, managers should let customers bring their cell phones in and rest their shoulders onto the aforementioned second formulation of Kantianism. If the people really are making use of their cell phones in a positive way as they describe it, then let them be that way. Let them bring their cell phones inside. Managers could not stop this as this is what majority of the people wants.


Question 2
"Before offering a job candidate a position, some potential employers do a criminal background check of the candidate. What are the pros and cons of this policy? Is this ethical? Discuss your answer based on one ethical principle of your choice."

Answer:
- The group decided as such that this matter of looking up for criminal record of an employee is looked as a Social Contract Theory from the seven principle of ethics. Why is it so is because of this issue is concerning future matters. Social contract theory concerns about a group of people, in lots of case of working together. This matter has it’s pros on the matter that if an employee actually have a criminal record, employer can actually save his other employees from any other harms way given that the one with criminal record might be a threat to others. In another way, this can also be a bad thing when the employee does not have any criminal record, making him/her believe that the employer is abusing his personal details. Even so, we counts the positive. The company itself should have rights on checking on the employees for the sake of the company itself, and for it’s employees’ safety, thus making it an ethical and workable method.

Question 3
"Refer to the lecture slide for this week on Intellectual Property. Explain with example the following:
  • Copyrights
  • Patents
  • Trademarks
  • Trade secrets"
Answer:
- Copyright: Gives the holder some exclusive rights to control some reproduction of works of authorship, for a certain period of time. copyright example would be a composer of a song. He has the right to reproduce his song to CDs and sell them. Distribute them to the interested party and also they can do a public display and public performance so that people can watch and see them and lastly they can derive another song from the ones that they have by using their own creativity and good composing skills.

- Patent: A public document that provides detailed description of invention. Patent example would be artistic work .this will protect the inventions for a period of 20 years from the date of application. It gives the owner the right to prevent others from making, using importing or selling the invention without permission.

- Trademark: Grants the owner exclusive right to use the trademark on the intended or related products for identification. Trademark example would be distinctive images like symbols, pictures, words. Distinctive & unique packaging. color combinations, building design, product Styles, overall Presentation

- Trade Secret: A trade secret reflects a wide array of information that derives independent economic value from not being widely disclosed or readily ascertainable. Enforceable for indefinite period of time. Trade secret example would be KFC. Their recipe is a trade secret which has given them commercial value. Trade secret can be identified through lawful methods of reverse engineering. Once the discovering of the trade secret, it has no more valid for the organization thus it will be advertised for public or meaning anyone can copy it, but as long as they are not known it will be advantage to the organization.

Question 4
"Discuss software duplicating from the perspectives of act utilitarianism."

Answer:
- Based on act utilitarianism, it is required to act in such that bring best outcome for most people (Prevos, 2004). Therefore, in act utilitarianism, software dupllicating is considered right as it allows the general public to obtain software at cheaper cost than original causing increase of happiness for more people compared to unhappyness of some software developers.  However, in some cases where software duplicating can be considered wrong from view of act utilitarianism where general public are purchasing the duplicated software believing the software to be original from the promotion strategy of the duplicated software which then will cause dissatisfaction to most people.

References
Prevos, Peter, 2004. Rule and Act Utilitarianism. [online] Available at: <http://prevos.net/ola/utilitarianism.pdf> [Accessed 9 November 2011]

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Redesign by thatisazam