10.1145/199544.199614acmconferencesArticle/Chapter ViewAbstractPublication PagesecaConference Proceedings
Article

Do disk drives dream of buffer cache hits?

Published:15 November 1994

ABSTRACT

G.E. Moore, in his book Principia Ethica, examines the popular view of ethics that deals with “what we ought to do” as well as using ethics to cover the general inquiry: “what is good?”

This paper utilises Moore's view of Ethics to examine computer systems performance. Moore asserts that “good” in itself is indefinable. It is argued in this report that, although we describe computer systems as good (or bad) a computer system cannot be good in itself, rather a means to good!

In terms of “what we ought to do” this paper looks at what actions (would) bring about good computer system performance according to computer science and engineering literature. In particular we look at duties, responsibilities and “to do what is right” in terms of system administration, design and usage.

We further argue that in order to first make ethical observations with respect computer system performance and then apply them, requires technical knowledge which is typically limited to industry specialists and experts.

References

  1. 1.Abshire G.M., Ethics Apply to Computer Specialists, Too. Computers and Society. Vol. 11, No. 2, pp. 22, Spring 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2.Abshire G.M., The Ethical Insensitivity of Computer Specialists and What You Can Do About It. Computers and Society, Vol. 12, No. 1, pp. 10-11, Winter 1982. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3.Attanasio C.R., Markstein P.W. and Philips R.J., Penetrating an operating system: a study of VM/370 integrity. IBM System Journal, pp 102-116, No. 1 1976.Google ScholarGoogle Scholar
  4. 4.Bach M.J., Design of the Unix Operating System. Prentice-Hall International Editions, 1986. ISBN: 0- 13-201757-1 025. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5.Baird B.J., Baird Jr. L.L and Ranauro R.P, The Moral Cracker? Computers and Security 6, pp 471-478, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6.Barns W.W., Guidelines for Efficient Subscriber Usage of the Defence Data Network. The M# Corporation, MTR-90W0(E#7, January 1990.Google ScholarGoogle Scholar
  7. 7.Bloombecker J., Computer Security - For the People., Computers in Society, Vol. 14, No.4. pp 12-15, 1985. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. 8.Burger R., Computer Viruses a High-Tech Disease. Abacus, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. 9.Carey F.E., Code of Ethics for Persons with Privileged Access to Computers and Networks at AT&T Bell Laboratories. AT&T Bell Labs Technical Memorandum 45267-920310-01TM, March 1992.Google ScholarGoogle Scholar
  10. 10.Clarke R., Asimov's Laws of Robotics: Implications for Information Technology Part 1. Computer, pp 51-61, December 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. 11.Clarke R., Asimov's Laws of Robotics: Implications for Information Technology Part 2. Computer, pp 57-66, January 1994. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12.Cohen S. and Grace D., Engineers and Social Responsibility: An Obligation to Do Good. IEEE Technology and Society Magazine, Fall 1994.Google ScholarGoogle ScholarCross RefCross Ref
  13. 13.Dewdney A.K., Computer Recreations Of worms, viruses and Core War. Scientific American pp 90-93, March 1989.Google ScholarGoogle Scholar
  14. 14.Dick P.K., Do Androids Dream of Electric Sheep? Grafton, 1972.Google ScholarGoogle Scholar
  15. 15.Eichin M.W. and Rochlis J.A, The Microscope and Tweezers: An Analysis of the Internet Virus of November 1988. To be presented at the 1989 IEEE Symposium on Research in Security and Privacy, February 1989.Google ScholarGoogle Scholar
  16. 16.Frey D. and Adams R., A Directory of Electronic Mail Addressing and Networks. O'Reilly & Associates, Inc., 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17.Frakes R., Terminator 2 Judgement Day. Sphere Books Ltd, 1991.Google ScholarGoogle Scholar
  18. 18.Granrose J., A compilation of Anonymous FTP sites. The Internet.Google ScholarGoogle Scholar
  19. 19.Grant R. and Naylor D., Kryten. Red Dwarf, Episode 1, Series 2.Google ScholarGoogle Scholar
  20. 20.Harman G., The Nature of Morality an Introduction to Ethics. Oxford University Press, 1977.Google ScholarGoogle Scholar
  21. 21.Henderson H., The USENET System. UNIX Papers for UNIX Developers and Power Users, Howard W.Sams & Company, pp 42-90, 1987.Google ScholarGoogle Scholar
  22. 22.Henry G.J., The Fair Share Scheduler. AT&T Bell Labs Technical Journal, Vol. 63, No. 8, October 1984.Google ScholarGoogle Scholar
  23. 23.Henry G.J., pers. comm., 1994.Google ScholarGoogle Scholar
  24. 24.Holt A.G., Distributed Systems over Wide Area Networks. Research Degree Report, October 1993.Google ScholarGoogle Scholar
  25. 25.Interact Document, Real Progranuners Don't Use Pascal. Widely circulated Interact Document.Google ScholarGoogle Scholar
  26. 26.Johnson D.G., Computer Ethics. Prentice Hall.Google ScholarGoogle Scholar
  27. 27.Kadie C., A critique of the Iowa State University's Computer Ethics policy.Google ScholarGoogle Scholar
  28. 28.Kernighan B.W. and Pike B., The Unix Programming Environment, Prentice Hall, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. 29.Kroll E., The Whole lnternet User Guide & Catalog. O'Reilly & Associates, inc., 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30.LaQuay T.L., The user's DIRECTORY of computer networks. Digital Press/Prentice Hall International Edition, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31.Liu P., LAN Traffic Symptoms & Problem Solving Case Studies from LAN Traffic Monitoring. AT&T Bell Laboratories Presentation.Google ScholarGoogle Scholar
  32. 32.Liu P., Preliminary Assessment of Wide-area File Sharing. AT&T Bell Laboratories Technical Memorandum 45262-910801-01IM, August 1991.Google ScholarGoogle Scholar
  33. 33.Loukides M., System Performance Tuning. O'Reilly & Associates, Inc., October 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34.McLean F. Integrating Ethics and Design. IEEE Technology and Society Magazine, Fall 1993.Google ScholarGoogle ScholarCross RefCross Ref
  35. 35.Mitcham C., Computers: From Ethos and Ethics to Mythos and Religion. Technology in Society, Vol. 8, pp. 171-201, 1986.Google ScholarGoogle Scholar
  36. 36.Morningstar C. and Farmer ER., Lessons of Lucas- Film Habitat. Cyberspace First Steps, pp 273-300, The MIT Press 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. 37.Moore G.E., Principia Ethica. The Cambridge University Press, 2nd edition, 1959.Google ScholarGoogle Scholar
  38. 38.Ritchie D.M., Unix Time-Sharing System: A Retrospective. The Bell System Technical Journal, Vol. 57, No. 6, July-August 1978.Google ScholarGoogle Scholar
  39. 39.Rheingold H., Virtual Reality. Secker & Warburg, 1991. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. 40.Shooting Shark, Unix Nasties, Phrack, Vol. 1, Issue 6, Phile 5, April 1986.Google ScholarGoogle Scholar
  41. 41.Spafford E., The Internet Worm Program: An Analysis. Purdue Technical Report CSD-TR-823 (available from Anonymous FTP sites on the Intemet), December 1988.Google ScholarGoogle Scholar
  42. 42.Spafford E., Some Musing on Ethics and Computer Break-ins. Purdue Technical Report (available from Anonymous Fq'P sites on the internet).Google ScholarGoogle Scholar
  43. 43.Stevens W.R., Unix Network Programming. Prentice Hall Inc, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. 44.Stata R., Foundation of Ethics. WWW hypertext document, http://www.vix.com/pub/objectivism/ MiT-Talks/ethics/ section3_ 1 .htmI#SECTION0001 #, May 1994.Google ScholarGoogle Scholar
  45. 45.Stoll C., The Cuckoo's Egg. The Bodley Head, 1989.Google ScholarGoogle Scholar
  46. 46.Travaglia S., The Bastard Operator From Hell (available from Internet Anonymous FTP sites).Google ScholarGoogle Scholar
  47. 47.Winner L., Citizen Virtues in a Technological Order. Applied Ethics: A Reader, pp 46-68, B lackwell, 1993.Google ScholarGoogle Scholar

Index Terms

  1. Do disk drives dream of buffer cache hits?

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              ACM Conferences cover image
              ECA '94: Proceedings of the conference on Ethics in the computer age
              November 1994
              210 pages
              ISBN:0897916441
              DOI:10.1145/199544

              Copyright © 1994 ACM

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 15 November 1994

              Permissions

              Request permissions about this article.

              Request Permissions

              Qualifiers

              • Article
            • Article Metrics

              • Downloads (Last 12 months)2
              • Downloads (Last 6 weeks)0

              Other Metrics

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader
            About Cookies On This Site

            We use cookies to ensure that we give you the best experience on our website.

            Learn more

            Got it!